00000002000000060000000a0000250e0200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x80000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:06 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000480e0200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:06 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a00004c0e0200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2286.944330][ T5912] FAULT_INJECTION: forcing a failure. [ 2286.944330][ T5912] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2286.972930][ T5912] CPU: 0 PID: 5912 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2286.983010][ T5912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2286.993205][ T5912] Call Trace: [ 2286.996493][ T5912] dump_stack+0x1b0/0x21e [ 2287.000832][ T5912] ? devkmsg_release+0x11c/0x11c [ 2287.005741][ T5912] ? show_regs_print_info+0x12/0x12 [ 2287.010914][ T5912] ? avc_has_perm_noaudit+0x36d/0x3f0 [ 2287.016294][ T5912] should_fail+0x6fb/0x860 [ 2287.020680][ T5912] ? setup_fault_attr+0x2b0/0x2b0 [ 2287.025677][ T5912] __alloc_pages_nodemask+0x1ee/0x7c0 [ 2287.031025][ T5912] ? selinux_syslog+0x120/0x120 [ 2287.035847][ T5912] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2287.041369][ T5912] ? percpu_counter_add_batch+0x12d/0x150 [ 2287.047064][ T5912] shmem_getpage_gfp+0xe62/0x2410 [ 2287.052071][ T5912] ? shmem_getpage+0xa0/0xa0 [ 2287.056648][ T5912] ? unwind_get_return_address+0x48/0x90 [ 2287.062254][ T5912] ? page_mapping+0x1cb/0x280 [ 2287.066902][ T5912] ? iov_iter_fault_in_readable+0x2bd/0x5c0 [ 2287.072763][ T5912] ? uuid_parse+0x3e0/0x3e0 [ 2287.077237][ T5912] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 2287.082926][ T5912] shmem_write_begin+0xc5/0x190 [ 2287.087750][ T5912] generic_perform_write+0x271/0x530 [ 2287.093019][ T5912] ? grab_cache_page_write_begin+0x90/0x90 [ 2287.098816][ T5912] ? file_remove_privs+0x600/0x600 [ 2287.103908][ T5912] ? down_write+0xd8/0x150 [ 2287.108327][ T5912] __generic_file_write_iter+0x232/0x460 [ 2287.113944][ T5912] generic_file_write_iter+0x4a6/0x650 [ 2287.119412][ T5912] __vfs_write+0x579/0x700 [ 2287.123805][ T5912] ? __kernel_write+0x340/0x340 [ 2287.128660][ T5912] ? security_file_permission+0x128/0x300 [ 2287.134398][ T5912] vfs_write+0x217/0x4f0 [ 2287.138618][ T5912] __x64_sys_pwrite64+0x1af/0x240 [ 2287.143615][ T5912] ? ksys_pwrite64+0x1d0/0x1d0 [ 2287.148384][ T5912] ? __fd_install+0x113/0x260 [ 2287.153036][ T5912] do_syscall_64+0xcb/0x150 [ 2287.157524][ T5912] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2287.163396][ T5912] RIP: 0033:0x4179b7 [ 2287.167356][ T5912] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 07 fa ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 4d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2287.186935][ T5912] RSP: 002b:00007f415c78ba20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2287.195320][ T5912] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004179b7 [ 2287.203300][ T5912] RDX: 0000000000000094 RSI: 0000000020012f00 RDI: 0000000000000004 [ 2287.211247][ T5912] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2287.219205][ T5912] R10: 0000000000022100 R11: 0000000000000293 R12: 0000000000000006 [ 2287.227155][ T5912] R13: 0000000000000004 R14: 0000000000000004 R15: 0000000020000288 18:55:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xff0f) 18:55:06 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000600e0200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:06 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000001340000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:06 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x80040, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:06 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000680e0200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2287.370883][ T5912] EXT4-fs error (device loop4): ext4_fill_super:4591: inode #2: comm syz-executor.4: iget: root inode unallocated [ 2287.383209][ T5912] EXT4-fs (loop4): get root inode failed [ 2287.389764][ T5912] EXT4-fs (loop4): mount failed [ 2287.395852][ T5926] FAULT_INJECTION: forcing a failure. [ 2287.395852][ T5926] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.409001][ T5926] CPU: 0 PID: 5926 Comm: syz-executor.3 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2287.419054][ T5926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.429100][ T5926] Call Trace: [ 2287.432373][ T5926] dump_stack+0x1b0/0x21e [ 2287.436684][ T5926] ? devkmsg_release+0x11c/0x11c [ 2287.441628][ T5926] ? show_regs_print_info+0x12/0x12 [ 2287.446818][ T5926] ? __fsnotify_parent+0x300/0x300 [ 2287.451929][ T5926] should_fail+0x6fb/0x860 [ 2287.456339][ T5926] ? setup_fault_attr+0x2b0/0x2b0 [ 2287.461380][ T5926] ? __se_sys_memfd_create+0xf1/0x380 [ 2287.466740][ T5926] should_failslab+0x5/0x20 [ 2287.471230][ T5926] __kmalloc+0x5f/0x2c0 [ 2287.475376][ T5926] ? __ia32_sys_read+0x80/0x80 [ 2287.480131][ T5926] ? strnlen_user+0x185/0x210 [ 2287.484901][ T5926] __se_sys_memfd_create+0xf1/0x380 [ 2287.490091][ T5926] do_syscall_64+0xcb/0x150 [ 2287.494588][ T5926] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2287.500476][ T5926] RIP: 0033:0x45de59 [ 2287.504363][ T5926] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2287.523961][ T5926] RSP: 002b:00007fcfde433a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2287.532369][ T5926] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 2287.540344][ T5926] RDX: 0000000020000290 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 2287.548301][ T5926] RBP: 0000000000044200 R08: 0000000020000290 R09: 0000000000000000 [ 2287.556256][ T5926] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000006 18:55:07 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:07 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a00006c0e0200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:07 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000002240000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:07 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2287.564209][ T5926] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2287.578875][ T5933] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:07 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000740e0200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xa0000) [ 2287.654688][ T5944] FAULT_INJECTION: forcing a failure. [ 2287.654688][ T5944] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.668258][ T5944] CPU: 1 PID: 5944 Comm: syz-executor.3 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2287.678320][ T5944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.688352][ T5944] Call Trace: [ 2287.691637][ T5944] dump_stack+0x1b0/0x21e [ 2287.695951][ T5944] ? devkmsg_release+0x11c/0x11c [ 2287.700859][ T5944] ? show_regs_print_info+0x12/0x12 [ 2287.706023][ T5944] ? __kasan_kmalloc+0x179/0x1b0 [ 2287.710931][ T5944] ? __kmalloc+0xf7/0x2c0 [ 2287.715249][ T5944] ? __se_sys_memfd_create+0xf1/0x380 [ 2287.720603][ T5944] ? do_syscall_64+0xcb/0x150 [ 2287.725261][ T5944] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2287.731301][ T5944] should_fail+0x6fb/0x860 [ 2287.735708][ T5944] ? setup_fault_attr+0x2b0/0x2b0 [ 2287.740699][ T5944] ? fsnotify+0x13a0/0x1460 [ 2287.745173][ T5944] ? expand_files+0xd1/0x970 [ 2287.749735][ T5944] ? shmem_alloc_inode+0x17/0x40 [ 2287.754644][ T5944] should_failslab+0x5/0x20 [ 2287.759122][ T5944] kmem_cache_alloc+0x36/0x250 [ 2287.763855][ T5944] ? shmem_match+0x150/0x150 [ 2287.768414][ T5944] shmem_alloc_inode+0x17/0x40 [ 2287.773144][ T5944] ? shmem_match+0x150/0x150 [ 2287.777717][ T5944] new_inode_pseudo+0x64/0x240 [ 2287.782452][ T5944] new_inode+0x25/0x1d0 [ 2287.786598][ T5944] shmem_get_inode+0x118/0x640 [ 2287.791345][ T5944] ? _raw_spin_unlock+0x5/0x20 [ 2287.796077][ T5944] __shmem_file_setup+0x11e/0x270 [ 2287.801072][ T5944] __se_sys_memfd_create+0x1fa/0x380 [ 2287.806341][ T5944] do_syscall_64+0xcb/0x150 [ 2287.810815][ T5944] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2287.816687][ T5944] RIP: 0033:0x45de59 [ 2287.820732][ T5944] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2287.840315][ T5944] RSP: 002b:00007fcfde433a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 18:55:07 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2287.848696][ T5944] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 2287.856636][ T5944] RDX: 0000000020000290 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 2287.864575][ T5944] RBP: 0000000000044200 R08: 0000000020000290 R09: 0000000000000000 [ 2287.872519][ T5944] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000006 [ 2287.880491][ T5944] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x1fffff, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:07 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a00007a0e0200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:07 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000002540000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:07 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000003f0200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2287.909514][ T5947] FAULT_INJECTION: forcing a failure. [ 2287.909514][ T5947] name failslab, interval 1, probability 0, space 0, times 0 [ 2287.922488][ T5947] CPU: 0 PID: 5947 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2287.932545][ T5947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2287.942588][ T5947] Call Trace: [ 2287.945873][ T5947] dump_stack+0x1b0/0x21e [ 2287.950212][ T5947] ? devkmsg_release+0x11c/0x11c 18:55:07 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000004840000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2287.955147][ T5947] ? show_regs_print_info+0x12/0x12 [ 2287.960340][ T5947] ? memset+0x1f/0x40 [ 2287.964314][ T5947] should_fail+0x6fb/0x860 [ 2287.968722][ T5947] ? setup_fault_attr+0x2b0/0x2b0 [ 2287.973740][ T5947] ? __fsnotify_parent+0x300/0x300 [ 2287.978848][ T5947] ? getname_flags+0xb8/0x610 [ 2287.983515][ T5947] should_failslab+0x5/0x20 [ 2287.988011][ T5947] kmem_cache_alloc+0x36/0x250 [ 2287.992771][ T5947] getname_flags+0xb8/0x610 [ 2287.997270][ T5947] do_sys_open+0x2fc/0x620 [ 2288.001685][ T5947] ? file_open_root+0x440/0x440 [ 2288.006529][ T5947] ? __fd_install+0x113/0x260 [ 2288.011200][ T5947] do_syscall_64+0xcb/0x150 [ 2288.015696][ T5947] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2288.021574][ T5947] RIP: 0033:0x417951 [ 2288.025458][ T5947] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2288.045047][ T5947] RSP: 002b:00007f415c78ba20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 18:55:07 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:07 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a000000400200000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:07 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000004c40000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2288.053430][ T5947] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000417951 [ 2288.054675][ T5963] FAULT_INJECTION: forcing a failure. [ 2288.054675][ T5963] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.061380][ T5947] RDX: 0000000000000094 RSI: 0000000000000002 RDI: 00007f415c78bae0 [ 2288.061386][ T5947] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2288.061392][ T5947] R10: 0000000000022100 R11: 0000000000000293 R12: 0000000000000006 [ 2288.061397][ T5947] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2288.106240][ T5963] CPU: 1 PID: 5963 Comm: syz-executor.3 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2288.116303][ T5963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.126351][ T5963] Call Trace: [ 2288.129669][ T5963] dump_stack+0x1b0/0x21e [ 2288.133982][ T5963] ? devkmsg_release+0x11c/0x11c [ 2288.138927][ T5963] ? show_regs_print_info+0x12/0x12 [ 2288.144101][ T5963] ? proc_fail_nth_write+0x166/0x200 [ 2288.149373][ T5963] should_fail+0x6fb/0x860 [ 2288.153781][ T5963] ? setup_fault_attr+0x2b0/0x2b0 [ 2288.158783][ T5963] ? memset+0x1f/0x40 [ 2288.162733][ T5963] ? should_fail+0x182/0x860 [ 2288.167293][ T5963] ? make_kgid+0x225/0x390 [ 2288.171677][ T5963] ? security_inode_alloc+0x32/0x1f0 [ 2288.176931][ T5963] should_failslab+0x5/0x20 [ 2288.181404][ T5963] kmem_cache_alloc+0x36/0x250 [ 2288.186144][ T5963] security_inode_alloc+0x32/0x1f0 [ 2288.191227][ T5963] inode_init_always+0x37c/0x800 [ 2288.196166][ T5963] ? shmem_match+0x150/0x150 [ 2288.200723][ T5963] new_inode_pseudo+0x7b/0x240 [ 2288.205455][ T5963] new_inode+0x25/0x1d0 [ 2288.209584][ T5963] shmem_get_inode+0x118/0x640 [ 2288.214325][ T5963] ? _raw_spin_unlock+0x5/0x20 [ 2288.219057][ T5963] __shmem_file_setup+0x11e/0x270 [ 2288.224065][ T5963] __se_sys_memfd_create+0x1fa/0x380 [ 2288.229324][ T5963] do_syscall_64+0xcb/0x150 [ 2288.233806][ T5963] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2288.239664][ T5963] RIP: 0033:0x45de59 18:55:07 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0300000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:07 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2288.243526][ T5963] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2288.263102][ T5963] RSP: 002b:00007fcfde433a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2288.271484][ T5963] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 2288.279431][ T5963] RDX: 0000000020000290 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 2288.287372][ T5963] RBP: 0000000000044200 R08: 0000000020000290 R09: 0000000000000000 [ 2288.295316][ T5963] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000006 [ 2288.303265][ T5963] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x1000000) 18:55:07 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000006040000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x1000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2288.349388][ T5976] FAULT_INJECTION: forcing a failure. [ 2288.349388][ T5976] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.371642][ T5976] CPU: 1 PID: 5976 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2288.381704][ T5976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.391745][ T5976] Call Trace: [ 2288.395024][ T5976] dump_stack+0x1b0/0x21e [ 2288.399322][ T5976] ? devkmsg_release+0x11c/0x11c [ 2288.404236][ T5976] ? show_regs_print_info+0x12/0x12 [ 2288.409407][ T5976] ? memset+0x1f/0x40 [ 2288.413378][ T5976] should_fail+0x6fb/0x860 [ 2288.417777][ T5976] ? setup_fault_attr+0x2b0/0x2b0 [ 2288.422771][ T5976] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2288.428823][ T5976] ? __rcu_read_lock+0x50/0x50 [ 2288.433570][ T5976] ? __alloc_file+0x26/0x390 [ 2288.438128][ T5976] should_failslab+0x5/0x20 [ 2288.442606][ T5976] kmem_cache_alloc+0x36/0x250 [ 2288.447338][ T5976] ? 0xffffffffa0128000 [ 2288.451463][ T5976] __alloc_file+0x26/0x390 [ 2288.455860][ T5976] ? alloc_empty_file+0x49/0x1b0 [ 2288.460765][ T5976] alloc_empty_file+0xa9/0x1b0 [ 2288.465496][ T5976] path_openat+0x124/0x4270 [ 2288.469987][ T5976] ? stack_trace_save+0x111/0x1e0 [ 2288.474995][ T5976] ? stack_trace_snprint+0x150/0x150 [ 2288.480262][ T5976] ? do_filp_open+0x430/0x430 [ 2288.484907][ T5976] ? __kasan_kmalloc+0x117/0x1b0 [ 2288.489828][ T5976] ? kmem_cache_alloc+0x1d5/0x250 [ 2288.494819][ T5976] ? getname_flags+0xb8/0x610 [ 2288.499463][ T5976] ? do_sys_open+0x2fc/0x620 [ 2288.504039][ T5976] ? do_syscall_64+0xcb/0x150 [ 2288.508697][ T5976] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2288.514750][ T5976] ? generic_file_write_iter+0x4f6/0x650 [ 2288.520365][ T5976] do_filp_open+0x1f7/0x430 [ 2288.524853][ T5976] ? vfs_tmpfile+0x210/0x210 [ 2288.529418][ T5976] ? should_fail+0x182/0x860 [ 2288.533977][ T5976] ? __kernel_write+0x340/0x340 [ 2288.538796][ T5976] ? __alloc_fd+0x590/0x590 [ 2288.543294][ T5976] ? _raw_spin_lock+0xa1/0x170 [ 2288.548062][ T5976] ? _raw_spin_trylock_bh+0x190/0x190 [ 2288.553404][ T5976] ? _raw_spin_unlock+0x5/0x20 [ 2288.558137][ T5976] ? __alloc_fd+0x4e8/0x590 [ 2288.562609][ T5976] do_sys_open+0x343/0x620 [ 2288.566997][ T5976] ? file_open_root+0x440/0x440 [ 2288.571831][ T5976] ? __fd_install+0x113/0x260 [ 2288.576479][ T5976] do_syscall_64+0xcb/0x150 [ 2288.580972][ T5976] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2288.586845][ T5976] RIP: 0033:0x417951 [ 2288.590724][ T5976] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2288.610297][ T5976] RSP: 002b:00007f415c78ba20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2288.618672][ T5976] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000417951 [ 2288.626622][ T5976] RDX: 0000000000000094 RSI: 0000000000000002 RDI: 00007f415c78bae0 [ 2288.634561][ T5976] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2288.642509][ T5976] R10: 0000000000022100 R11: 0000000000000293 R12: 0000000000000006 18:55:08 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0400000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:08 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2288.650464][ T5976] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2288.672896][ T5978] FAULT_INJECTION: forcing a failure. [ 2288.672896][ T5978] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.686187][ T5978] CPU: 0 PID: 5978 Comm: syz-executor.3 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2288.696233][ T5978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.706265][ T5978] Call Trace: [ 2288.709551][ T5978] dump_stack+0x1b0/0x21e [ 2288.713904][ T5978] ? devkmsg_release+0x11c/0x11c [ 2288.718835][ T5978] ? show_regs_print_info+0x12/0x12 [ 2288.724024][ T5978] ? proc_fail_nth_write+0x166/0x200 [ 2288.729308][ T5978] should_fail+0x6fb/0x860 [ 2288.733722][ T5978] ? setup_fault_attr+0x2b0/0x2b0 [ 2288.738740][ T5978] ? do_syscall_64+0xcb/0x150 [ 2288.741944][ T5986] FAULT_INJECTION: forcing a failure. 18:55:08 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0700000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2288.741944][ T5986] name failslab, interval 1, probability 0, space 0, times 0 [ 2288.743410][ T5978] ? setup_fault_attr+0x2b0/0x2b0 [ 2288.743422][ T5978] ? memset+0x1f/0x40 [ 2288.743431][ T5978] ? should_fail+0x182/0x860 [ 2288.743441][ T5978] ? __d_alloc+0x2a/0x6b0 [ 2288.743456][ T5978] should_failslab+0x5/0x20 [ 2288.778339][ T5978] kmem_cache_alloc+0x36/0x250 [ 2288.783083][ T5978] ? security_inode_alloc+0x32/0x1f0 [ 2288.788345][ T5978] __d_alloc+0x2a/0x6b0 [ 2288.792478][ T5978] ? ktime_get_coarse_real_ts64+0xd9/0xf0 [ 2288.798172][ T5978] d_alloc_pseudo+0x19/0x70 [ 2288.802650][ T5978] alloc_file_pseudo+0x128/0x310 [ 2288.807563][ T5978] ? alloc_empty_file_noaccount+0x70/0x70 [ 2288.813260][ T5978] __shmem_file_setup+0x194/0x270 [ 2288.818263][ T5978] __se_sys_memfd_create+0x1fa/0x380 [ 2288.823524][ T5978] do_syscall_64+0xcb/0x150 [ 2288.828002][ T5978] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2288.833888][ T5978] RIP: 0033:0x45de59 [ 2288.837777][ T5978] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2288.857356][ T5978] RSP: 002b:00007fcfde433a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2288.865743][ T5978] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 2288.873692][ T5978] RDX: 0000000020000290 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 2288.881637][ T5978] RBP: 0000000000044200 R08: 0000000020000290 R09: 0000000000000000 [ 2288.889585][ T5978] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000006 [ 2288.897531][ T5978] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2288.912943][ T5986] CPU: 0 PID: 5986 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2288.923018][ T5986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2288.933057][ T5986] Call Trace: [ 2288.936343][ T5986] dump_stack+0x1b0/0x21e [ 2288.938234][ T5985] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2288.940663][ T5986] ? devkmsg_release+0x11c/0x11c [ 2288.940676][ T5986] ? show_regs_print_info+0x12/0x12 [ 2288.940688][ T5986] ? unwind_get_return_address_ptr+0x130/0x130 [ 2288.940706][ T5986] should_fail+0x6fb/0x860 [ 2288.970178][ T5986] ? setup_fault_attr+0x2b0/0x2b0 [ 2288.975212][ T5986] ? should_fail+0x182/0x860 [ 2288.979805][ T5986] ? setup_fault_attr+0x2b0/0x2b0 [ 2288.984796][ T5986] ? ___slab_alloc+0x9b/0x450 [ 2288.989459][ T5986] ? security_file_alloc+0x32/0x200 [ 2288.994624][ T5986] should_failslab+0x5/0x20 [ 2288.999094][ T5986] kmem_cache_alloc+0x36/0x250 [ 2289.003831][ T5986] security_file_alloc+0x32/0x200 [ 2289.008854][ T5986] __alloc_file+0xc6/0x390 [ 2289.013242][ T5986] alloc_empty_file+0xa9/0x1b0 [ 2289.017975][ T5986] path_openat+0x124/0x4270 [ 2289.022451][ T5986] ? stack_trace_save+0x111/0x1e0 [ 2289.027479][ T5986] ? stack_trace_snprint+0x150/0x150 [ 2289.032750][ T5986] ? do_filp_open+0x430/0x430 [ 2289.037393][ T5986] ? __kasan_kmalloc+0x117/0x1b0 [ 2289.042298][ T5986] ? kmem_cache_alloc+0x1d5/0x250 [ 2289.047291][ T5986] ? getname_flags+0xb8/0x610 [ 2289.051953][ T5986] ? do_sys_open+0x2fc/0x620 [ 2289.056511][ T5986] ? do_syscall_64+0xcb/0x150 [ 2289.061187][ T5986] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2289.067229][ T5986] ? generic_file_write_iter+0x4f6/0x650 [ 2289.072834][ T5986] do_filp_open+0x1f7/0x430 [ 2289.077307][ T5986] ? vfs_tmpfile+0x210/0x210 [ 2289.081864][ T5986] ? should_fail+0x182/0x860 [ 2289.086427][ T5986] ? __kernel_write+0x340/0x340 [ 2289.091261][ T5986] ? __alloc_fd+0x590/0x590 [ 2289.095734][ T5986] ? _raw_spin_lock+0xa1/0x170 [ 2289.100469][ T5986] ? _raw_spin_trylock_bh+0x190/0x190 [ 2289.105809][ T5986] ? _raw_spin_unlock+0x5/0x20 [ 2289.110548][ T5986] ? __alloc_fd+0x4e8/0x590 [ 2289.115026][ T5986] do_sys_open+0x343/0x620 [ 2289.119431][ T5986] ? file_open_root+0x440/0x440 [ 2289.124251][ T5986] ? __fd_install+0x113/0x260 [ 2289.128896][ T5986] do_syscall_64+0xcb/0x150 [ 2289.133371][ T5986] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2289.139235][ T5986] RIP: 0033:0x417951 [ 2289.143100][ T5986] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 6a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 b3 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2289.162681][ T5986] RSP: 002b:00007f415c78ba20 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2289.171063][ T5986] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000417951 [ 2289.179007][ T5986] RDX: 0000000000000094 RSI: 0000000000000002 RDI: 00007f415c78bae0 [ 2289.186949][ T5986] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2289.194891][ T5986] R10: 0000000000022100 R11: 0000000000000293 R12: 0000000000000006 18:55:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x2000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:08 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0800000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:08 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:08 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:08 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000006840000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2289.202837][ T5986] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 18:55:08 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0a00000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x2000000) [ 2289.264990][ T6002] FAULT_INJECTION: forcing a failure. [ 2289.264990][ T6002] name failslab, interval 1, probability 0, space 0, times 0 [ 2289.277667][ T6002] CPU: 1 PID: 6002 Comm: syz-executor.3 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2289.287718][ T6002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2289.297764][ T6002] Call Trace: [ 2289.301053][ T6002] dump_stack+0x1b0/0x21e [ 2289.305379][ T6002] ? devkmsg_release+0x11c/0x11c [ 2289.310312][ T6002] ? show_regs_print_info+0x12/0x12 [ 2289.315505][ T6002] ? memset+0x1f/0x40 [ 2289.319492][ T6002] ? unwind_next_frame+0x1c07/0x22b0 [ 2289.324774][ T6002] should_fail+0x6fb/0x860 [ 2289.329274][ T6002] ? setup_fault_attr+0x2b0/0x2b0 [ 2289.334291][ T6002] ? ebitmap_cmp+0x1c8/0x230 [ 2289.338875][ T6002] ? mls_compute_context_len+0x7f0/0x820 [ 2289.344541][ T6002] ? context_struct_to_string+0x3b5/0x7f0 [ 2289.350267][ T6002] should_failslab+0x5/0x20 [ 2289.354776][ T6002] __kmalloc+0x5f/0x2c0 [ 2289.358911][ T6002] context_struct_to_string+0x3b5/0x7f0 [ 2289.364441][ T6002] ? security_bounded_transition+0x520/0x520 [ 2289.370608][ T6002] ? mls_range_isvalid+0x363/0x480 [ 2289.375687][ T6002] context_add_hash+0xf5/0x200 [ 2289.380429][ T6002] ? security_sid_to_context_inval+0x40/0x40 [ 2289.386388][ T6002] ? mls_context_isvalid+0x98/0x380 [ 2289.391597][ T6002] ? policydb_context_isvalid+0x1b6/0x400 [ 2289.397285][ T6002] security_compute_sid+0x1147/0x1be0 [ 2289.402627][ T6002] ? security_transition_sid+0x90/0x90 [ 2289.408072][ T6002] ? stack_trace_save+0x111/0x1e0 [ 2289.413066][ T6002] ? __kasan_kmalloc+0x179/0x1b0 [ 2289.417990][ T6002] ? __kasan_kmalloc+0x117/0x1b0 [ 2289.422901][ T6002] ? kmem_cache_alloc+0x1d5/0x250 [ 2289.427918][ T6002] ? __d_alloc+0x2a/0x6b0 [ 2289.432217][ T6002] ? d_alloc_pseudo+0x19/0x70 [ 2289.436863][ T6002] ? alloc_file_pseudo+0x128/0x310 [ 2289.441942][ T6002] ? __shmem_file_setup+0x194/0x270 [ 2289.447107][ T6002] ? __se_sys_memfd_create+0x1fa/0x380 [ 2289.452532][ T6002] ? do_syscall_64+0xcb/0x150 [ 2289.457185][ T6002] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2289.463232][ T6002] ? inode_init_always+0x37c/0x800 [ 2289.468311][ T6002] ? new_inode_pseudo+0x7b/0x240 [ 2289.473215][ T6002] ? new_inode+0x25/0x1d0 [ 2289.477513][ T6002] ? new_inode+0x25/0x1d0 [ 2289.481809][ T6002] ? shmem_get_inode+0x118/0x640 [ 2289.486712][ T6002] ? _raw_spin_lock+0xa1/0x170 [ 2289.491462][ T6002] ? _raw_spin_trylock_bh+0x190/0x190 [ 2289.496804][ T6002] security_transition_sid+0x78/0x90 [ 2289.502060][ T6002] inode_doinit_with_dentry+0x5e0/0x10e0 [ 2289.507665][ T6002] ? sb_finish_set_opts+0x7e0/0x7e0 [ 2289.512841][ T6002] security_d_instantiate+0x90/0xf0 [ 2289.518027][ T6002] d_instantiate+0x51/0x90 [ 2289.522414][ T6002] alloc_file_pseudo+0x24a/0x310 [ 2289.527324][ T6002] ? alloc_empty_file_noaccount+0x70/0x70 [ 2289.533035][ T6002] __shmem_file_setup+0x194/0x270 [ 2289.538028][ T6002] __se_sys_memfd_create+0x1fa/0x380 [ 2289.543283][ T6002] do_syscall_64+0xcb/0x150 [ 2289.547756][ T6002] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2289.553615][ T6002] RIP: 0033:0x45de59 [ 2289.557479][ T6002] Code: 0d b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2289.577054][ T6002] RSP: 002b:00007fcfde433a28 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2289.585437][ T6002] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 000000000045de59 [ 2289.593401][ T6002] RDX: 0000000020000290 RSI: 0000000000000000 RDI: 00000000004c28a3 [ 2289.601345][ T6002] RBP: 0000000000044200 R08: 0000000020000290 R09: 0000000000000000 18:55:09 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0f00000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:09 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e1000000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2289.609285][ T6002] R10: fe03f80fe03f80ff R11: 0000000000000246 R12: 0000000000000006 [ 2289.617225][ T6002] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:09 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0202000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x3000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:09 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0203000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2289.677050][ T6002] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2289.689689][ T6002] EXT4-fs (loop3): get root inode failed [ 2289.696325][ T6002] EXT4-fs (loop3): mount failed [ 2289.714391][ T6010] FAULT_INJECTION: forcing a failure. [ 2289.714391][ T6010] name failslab, interval 1, probability 0, space 0, times 0 [ 2289.727298][ T6010] CPU: 0 PID: 6010 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2289.737352][ T6010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2289.747392][ T6010] Call Trace: [ 2289.750671][ T6010] dump_stack+0x1b0/0x21e [ 2289.754970][ T6010] ? devkmsg_release+0x11c/0x11c [ 2289.759879][ T6010] ? show_regs_print_info+0x12/0x12 [ 2289.765084][ T6010] should_fail+0x6fb/0x860 [ 2289.769497][ T6010] ? setup_fault_attr+0x2b0/0x2b0 [ 2289.774506][ T6010] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 2289.780120][ T6010] ? update_sg_lb_stats+0x670/0xce0 [ 2289.785317][ T6010] ? kobject_del+0x210/0x210 [ 2289.789878][ T6010] ? mutex_lock+0xa6/0x110 [ 2289.794326][ T6010] ? __kthread_create_on_node+0x142/0x470 [ 2289.800020][ T6010] should_failslab+0x5/0x20 [ 2289.804495][ T6010] kmem_cache_alloc_trace+0x39/0x270 [ 2289.809760][ T6010] ? loop_set_status_from_info+0x720/0x720 [ 2289.815565][ T6010] __kthread_create_on_node+0x142/0x470 [ 2289.821079][ T6010] ? kthread_create_on_node+0x110/0x110 [ 2289.826604][ T6010] ? __ww_mutex_lock_interruptible_slowpath+0x10/0x10 [ 2289.833357][ T6010] ? _raw_spin_unlock+0x5/0x20 [ 2289.838095][ T6010] ? bd_start_claiming+0x469/0x550 [ 2289.843204][ T6010] ? loop_set_status_from_info+0x720/0x720 [ 2289.848988][ T6010] kthread_create_on_node+0xc6/0x110 [ 2289.854285][ T6010] ? tsk_fork_get_node+0x10/0x10 [ 2289.859206][ T6010] ? loop_set_status_from_info+0x2c6/0x720 [ 2289.864981][ T6010] ? memcpy+0x38/0x50 [ 2289.868934][ T6010] ? memset+0x1f/0x40 [ 2289.872887][ T6010] loop_configure+0x7c9/0x1380 [ 2289.877635][ T6010] lo_ioctl+0x781/0x22e0 [ 2289.881849][ T6010] ? lo_release+0x1e0/0x1e0 [ 2289.886345][ T6010] ? update_blocked_averages+0xea0/0xea0 [ 2289.891969][ T6010] ? arch_stack_walk+0x98/0xe0 [ 2289.896705][ T6010] ? _raw_spin_lock+0xa1/0x170 [ 2289.901437][ T6010] ? _raw_spin_trylock_bh+0x190/0x190 [ 2289.906788][ T6010] ? __rcu_read_lock+0x50/0x50 [ 2289.911529][ T6010] ? update_load_avg+0x410/0x8f0 [ 2289.916438][ T6010] ? enqueue_entity+0x74f/0xd80 [ 2289.921260][ T6010] ? check_preempt_wakeup+0x6fc/0xd60 [ 2289.926609][ T6010] ? ttwu_do_wakeup+0x154/0x5b0 [ 2289.931427][ T6010] ? _raw_spin_unlock+0x5/0x20 [ 2289.936164][ T6010] ? ttwu_queue+0x243/0x380 [ 2289.940648][ T6010] ? psi_ttwu_dequeue+0x320/0x320 [ 2289.945672][ T6010] ? schedule+0x13b/0x1d0 [ 2289.949971][ T6010] ? try_to_wake_up+0xbe8/0xd80 [ 2289.954804][ T6010] ? cpus_share_cache+0xd0/0xd0 [ 2289.959636][ T6010] ? _raw_spin_lock+0xa1/0x170 [ 2289.964368][ T6010] ? _raw_spin_trylock_bh+0x190/0x190 [ 2289.969724][ T6010] ? avc_denied+0x1c0/0x1c0 [ 2289.974203][ T6010] ? memset+0x1f/0x40 [ 2289.978155][ T6010] ? unwind_next_frame+0x1c07/0x22b0 [ 2289.983414][ T6010] ? arch_stack_walk+0x78/0xe0 [ 2289.988150][ T6010] ? unwind_get_return_address_ptr+0x130/0x130 [ 2289.994287][ T6010] ? memset+0x1f/0x40 [ 2289.998264][ T6010] ? unwind_next_frame+0x1c07/0x22b0 [ 2290.003519][ T6010] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2290.009570][ T6010] ? lo_release+0x1e0/0x1e0 [ 2290.014063][ T6010] blkdev_ioctl+0x89a/0x2c30 [ 2290.018624][ T6010] ? 0xffffffffa0128000 [ 2290.022749][ T6010] ? is_bpf_text_address+0x290/0x2b0 [ 2290.028005][ T6010] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2290.033265][ T6010] ? stack_trace_save+0x1e0/0x1e0 [ 2290.038262][ T6010] ? __kernel_text_address+0x93/0x110 [ 2290.043607][ T6010] ? unwind_get_return_address+0x48/0x90 [ 2290.049207][ T6010] ? arch_stack_walk+0x98/0xe0 [ 2290.053943][ T6010] ? __rcu_read_lock+0x50/0x50 [ 2290.058681][ T6010] ? avc_has_extended_perms+0x69e/0x10c0 [ 2290.064297][ T6010] ? avc_has_extended_perms+0xb25/0x10c0 [ 2290.069900][ T6010] ? avc_ss_reset+0x3a0/0x3a0 [ 2290.074572][ T6010] ? kmem_cache_free+0xac/0x5c0 [ 2290.079401][ T6010] ? __kasan_slab_free+0x1e2/0x220 [ 2290.084481][ T6010] ? __kasan_slab_free+0x168/0x220 [ 2290.089563][ T6010] ? slab_free_freelist_hook+0xd0/0x150 [ 2290.095081][ T6010] ? kmem_cache_free+0xac/0x5c0 [ 2290.099901][ T6010] ? do_sys_open+0x4a3/0x620 [ 2290.104473][ T6010] ? do_syscall_64+0xcb/0x150 [ 2290.109118][ T6010] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2290.115155][ T6010] ? __kasan_kmalloc+0x117/0x1b0 [ 2290.120061][ T6010] ? kmem_cache_alloc+0x1d5/0x250 [ 2290.125056][ T6010] ? getname_flags+0xb8/0x610 [ 2290.129706][ T6010] ? do_sys_open+0x2fc/0x620 [ 2290.134267][ T6010] ? do_syscall_64+0xcb/0x150 [ 2290.138916][ T6010] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2290.144956][ T6010] ? generic_file_write_iter+0x4f6/0x650 [ 2290.150662][ T6010] block_ioctl+0xb6/0xf0 [ 2290.154879][ T6010] ? blkdev_iopoll+0xf0/0xf0 [ 2290.159457][ T6010] do_vfs_ioctl+0x746/0x16f0 [ 2290.164020][ T6010] ? selinux_file_ioctl+0x6e4/0x920 [ 2290.169187][ T6010] ? ioctl_preallocate+0x240/0x240 [ 2290.174274][ T6010] ? slab_free_freelist_hook+0xd0/0x150 [ 2290.179805][ T6010] ? __fget+0x37c/0x3c0 [ 2290.183946][ T6010] ? fget_many+0x20/0x20 [ 2290.188281][ T6010] ? __fpregs_load_activate+0x2d3/0x390 [ 2290.193800][ T6010] ? security_file_ioctl+0xad/0xc0 [ 2290.198896][ T6010] __x64_sys_ioctl+0xd4/0x110 [ 2290.203547][ T6010] do_syscall_64+0xcb/0x150 [ 2290.208020][ T6010] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2290.213882][ T6010] RIP: 0033:0x45dcc7 [ 2290.217746][ T6010] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2290.237324][ T6010] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2290.245703][ T6010] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2290.253660][ T6010] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2290.261604][ T6010] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2290.269563][ T6010] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 18:55:09 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:09 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0205000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:09 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:09 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:09 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000006c40000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:09 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0206000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2290.277506][ T6010] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2290.423144][ T6042] FAULT_INJECTION: forcing a failure. [ 2290.423144][ T6042] name failslab, interval 1, probability 0, space 0, times 0 [ 2290.435853][ T6042] CPU: 1 PID: 6042 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2290.445930][ T6042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2290.455955][ T6042] Call Trace: [ 2290.459222][ T6042] dump_stack+0x1b0/0x21e [ 2290.463522][ T6042] ? devkmsg_release+0x11c/0x11c [ 2290.468430][ T6042] ? show_regs_print_info+0x12/0x12 [ 2290.473606][ T6042] should_fail+0x6fb/0x860 [ 2290.478011][ T6042] ? setup_fault_attr+0x2b0/0x2b0 [ 2290.483020][ T6042] ? __rcu_read_lock+0x50/0x50 [ 2290.487762][ T6042] ? __kernfs_new_node+0xdb/0x6e0 [ 2290.492770][ T6042] should_failslab+0x5/0x20 [ 2290.497243][ T6042] kmem_cache_alloc+0x36/0x250 [ 2290.502000][ T6042] __kernfs_new_node+0xdb/0x6e0 [ 2290.506830][ T6042] ? kernfs_new_node+0x160/0x160 [ 2290.511736][ T6042] ? _raw_spin_unlock_irq+0x5/0x20 [ 2290.516823][ T6042] ? __schedule+0xaf5/0xe30 [ 2290.521305][ T6042] ? is_mmconf_reserved+0x420/0x420 [ 2290.526474][ T6042] kernfs_create_dir_ns+0x90/0x220 [ 2290.531571][ T6042] internal_create_group+0x234/0xe40 [ 2290.536831][ T6042] ? _raw_spin_unlock+0x5/0x20 [ 2290.541566][ T6042] ? sysfs_create_group+0x20/0x20 [ 2290.546560][ T6042] ? ___preempt_schedule+0x16/0x20 [ 2290.551644][ T6042] ? __loop_update_dio+0x23d/0x580 [ 2290.556740][ T6042] loop_configure+0xdd7/0x1380 [ 2290.561506][ T6042] lo_ioctl+0x781/0x22e0 [ 2290.565720][ T6042] ? lo_release+0x1e0/0x1e0 [ 2290.570198][ T6042] ? update_blocked_averages+0xea0/0xea0 [ 2290.575799][ T6042] ? arch_stack_walk+0x98/0xe0 [ 2290.580534][ T6042] ? _raw_spin_lock+0xa1/0x170 [ 2290.585288][ T6042] ? _raw_spin_trylock_bh+0x190/0x190 [ 2290.590643][ T6042] ? __rcu_read_lock+0x50/0x50 [ 2290.595376][ T6042] ? __rcu_read_lock+0x50/0x50 [ 2290.600115][ T6042] ? update_load_avg+0x410/0x8f0 [ 2290.605043][ T6042] ? enqueue_entity+0x74f/0xd80 [ 2290.609876][ T6042] ? check_preempt_wakeup+0x6fc/0xd60 [ 2290.615218][ T6042] ? ttwu_do_wakeup+0x154/0x5b0 [ 2290.620037][ T6042] ? _raw_spin_unlock+0x5/0x20 [ 2290.624769][ T6042] ? ttwu_queue+0x243/0x380 [ 2290.629239][ T6042] ? psi_ttwu_dequeue+0x320/0x320 [ 2290.634251][ T6042] ? try_to_wake_up+0xbe8/0xd80 [ 2290.639093][ T6042] ? cpus_share_cache+0xd0/0xd0 [ 2290.643910][ T6042] ? _raw_spin_lock+0xa1/0x170 [ 2290.648645][ T6042] ? _raw_spin_trylock_bh+0x190/0x190 [ 2290.654004][ T6042] ? memset+0x1f/0x40 [ 2290.657962][ T6042] ? unwind_next_frame+0x1c07/0x22b0 [ 2290.663215][ T6042] ? arch_stack_walk+0x78/0xe0 [ 2290.667948][ T6042] ? unwind_get_return_address_ptr+0x130/0x130 [ 2290.674067][ T6042] ? memset+0x1f/0x40 [ 2290.678031][ T6042] ? unwind_next_frame+0x1c07/0x22b0 [ 2290.683285][ T6042] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2290.689350][ T6042] ? lo_release+0x1e0/0x1e0 [ 2290.693825][ T6042] blkdev_ioctl+0x89a/0x2c30 [ 2290.698382][ T6042] ? 0xffffffffa0128000 [ 2290.702526][ T6042] ? is_bpf_text_address+0x290/0x2b0 [ 2290.707793][ T6042] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2290.713057][ T6042] ? stack_trace_save+0x1e0/0x1e0 [ 2290.718050][ T6042] ? __kernel_text_address+0x93/0x110 [ 2290.723399][ T6042] ? unwind_get_return_address+0x48/0x90 [ 2290.729011][ T6042] ? arch_stack_walk+0x98/0xe0 [ 2290.733744][ T6042] ? __rcu_read_lock+0x50/0x50 [ 2290.738479][ T6042] ? avc_has_extended_perms+0x69e/0x10c0 [ 2290.744094][ T6042] ? avc_has_extended_perms+0xb25/0x10c0 [ 2290.749694][ T6042] ? avc_ss_reset+0x3a0/0x3a0 [ 2290.754345][ T6042] ? kmem_cache_free+0xac/0x5c0 [ 2290.759179][ T6042] ? __kasan_slab_free+0x1e2/0x220 [ 2290.764257][ T6042] ? __kasan_slab_free+0x168/0x220 [ 2290.769349][ T6042] ? slab_free_freelist_hook+0xd0/0x150 [ 2290.774870][ T6042] ? kmem_cache_free+0xac/0x5c0 [ 2290.779689][ T6042] ? do_sys_open+0x4a3/0x620 [ 2290.784246][ T6042] ? do_syscall_64+0xcb/0x150 [ 2290.788887][ T6042] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2290.794934][ T6042] ? __kasan_kmalloc+0x117/0x1b0 [ 2290.799840][ T6042] ? kmem_cache_alloc+0x1d5/0x250 [ 2290.804851][ T6042] ? getname_flags+0xb8/0x610 [ 2290.809503][ T6042] ? do_sys_open+0x2fc/0x620 [ 2290.814058][ T6042] ? do_syscall_64+0xcb/0x150 [ 2290.818702][ T6042] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2290.824747][ T6042] ? generic_file_write_iter+0x4f6/0x650 [ 2290.830442][ T6042] block_ioctl+0xb6/0xf0 [ 2290.834661][ T6042] ? blkdev_iopoll+0xf0/0xf0 [ 2290.839227][ T6042] do_vfs_ioctl+0x746/0x16f0 [ 2290.843787][ T6042] ? selinux_file_ioctl+0x6e4/0x920 [ 2290.848964][ T6042] ? ioctl_preallocate+0x240/0x240 [ 2290.854055][ T6042] ? slab_free_freelist_hook+0xd0/0x150 [ 2290.859566][ T6042] ? __fget+0x37c/0x3c0 [ 2290.863704][ T6042] ? fget_many+0x20/0x20 [ 2290.867916][ T6042] ? __fpregs_load_activate+0x2d3/0x390 [ 2290.873436][ T6042] ? security_file_ioctl+0xad/0xc0 [ 2290.878518][ T6042] __x64_sys_ioctl+0xd4/0x110 [ 2290.883164][ T6042] do_syscall_64+0xcb/0x150 [ 2290.887647][ T6042] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2290.893504][ T6042] RIP: 0033:0x45dcc7 [ 2290.897366][ T6042] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2290.916937][ T6042] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2290.925402][ T6042] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2290.933342][ T6042] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2290.941299][ T6042] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2290.949242][ T6042] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2290.957186][ T6042] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2290.991705][ T6043] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2291.009572][ T6042] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2291.019672][ T6043] EXT4-fs (loop3): get root inode failed [ 2291.025699][ T6043] EXT4-fs (loop3): mount failed [ 2291.048867][ T6041] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x2040000) 18:55:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x4000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:10 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0207000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:10 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000007440000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:10 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:10 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:10 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0208000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:10 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0209000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2291.216932][ T6060] FAULT_INJECTION: forcing a failure. [ 2291.216932][ T6060] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.229806][ T6060] CPU: 1 PID: 6060 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2291.239858][ T6060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2291.249889][ T6060] Call Trace: [ 2291.253175][ T6060] dump_stack+0x1b0/0x21e [ 2291.257529][ T6060] ? devkmsg_release+0x11c/0x11c [ 2291.262448][ T6060] ? show_regs_print_info+0x12/0x12 [ 2291.267618][ T6060] ? mutex_lock+0xa6/0x110 [ 2291.272004][ T6060] ? mutex_trylock+0xb0/0xb0 [ 2291.276570][ T6060] ? idr_get_free+0x6de/0x880 [ 2291.281230][ T6060] should_fail+0x6fb/0x860 [ 2291.285620][ T6060] ? setup_fault_attr+0x2b0/0x2b0 [ 2291.290616][ T6060] ? selinux_kernfs_init_security+0x10a/0x700 [ 2291.296660][ T6060] ? __kernfs_new_node+0xdb/0x6e0 [ 2291.301680][ T6060] should_failslab+0x5/0x20 [ 2291.306182][ T6060] kmem_cache_alloc+0x36/0x250 [ 2291.310915][ T6060] ? idr_alloc+0x300/0x300 [ 2291.315300][ T6060] __kernfs_new_node+0xdb/0x6e0 [ 2291.320125][ T6060] ? __kernfs_new_node+0xdb/0x6e0 [ 2291.325136][ T6060] ? kernfs_new_node+0x160/0x160 [ 2291.330044][ T6060] ? security_kernfs_init_security+0x9a/0xb0 [ 2291.336008][ T6060] ? mutex_lock+0xa6/0x110 [ 2291.340394][ T6060] ? mutex_trylock+0xb0/0xb0 [ 2291.344965][ T6060] kernfs_new_node+0x95/0x160 [ 2291.349611][ T6060] __kernfs_create_file+0x45/0x260 [ 2291.354705][ T6060] sysfs_add_file_mode_ns+0x293/0x340 [ 2291.360046][ T6060] internal_create_group+0x511/0xe40 [ 2291.365314][ T6060] ? _raw_spin_unlock+0x5/0x20 [ 2291.370054][ T6060] ? sysfs_create_group+0x20/0x20 [ 2291.375054][ T6060] ? ___preempt_schedule+0x16/0x20 [ 2291.380133][ T6060] ? __loop_update_dio+0x23d/0x580 [ 2291.385228][ T6060] loop_configure+0xdd7/0x1380 [ 2291.389974][ T6060] lo_ioctl+0x781/0x22e0 [ 2291.394196][ T6060] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2291.400242][ T6060] ? lo_release+0x1e0/0x1e0 [ 2291.404716][ T6060] ? unwind_get_return_address_ptr+0x130/0x130 [ 2291.411470][ T6060] ? 0xffffffffa0128000 [ 2291.415611][ T6060] ? is_bpf_text_address+0x290/0x2b0 [ 2291.420895][ T6060] ? stack_trace_save+0x1e0/0x1e0 [ 2291.425898][ T6060] ? __kernel_text_address+0x93/0x110 [ 2291.431251][ T6060] ? unwind_get_return_address+0x48/0x90 [ 2291.436868][ T6060] ? arch_stack_walk+0x98/0xe0 [ 2291.441615][ T6060] ? stack_trace_save+0x111/0x1e0 [ 2291.446608][ T6060] ? stack_trace_snprint+0x150/0x150 [ 2291.451876][ T6060] ? arch_stack_walk+0x78/0xe0 [ 2291.456620][ T6060] ? __kasan_kmalloc+0x179/0x1b0 [ 2291.461539][ T6060] ? __rcu_read_lock+0x50/0x50 [ 2291.466292][ T6060] ? update_load_avg+0x410/0x8f0 [ 2291.471216][ T6060] ? enqueue_entity+0x74f/0xd80 [ 2291.476035][ T6060] ? check_preempt_wakeup+0x6fc/0xd60 [ 2291.481375][ T6060] ? ttwu_do_wakeup+0x154/0x5b0 [ 2291.486205][ T6060] ? _raw_spin_unlock+0x5/0x20 [ 2291.490949][ T6060] ? ttwu_queue+0x243/0x380 [ 2291.495422][ T6060] ? psi_ttwu_dequeue+0x320/0x320 [ 2291.500425][ T6060] ? schedule+0x13b/0x1d0 [ 2291.504734][ T6060] ? try_to_wake_up+0xbe8/0xd80 [ 2291.509562][ T6060] ? cpus_share_cache+0xd0/0xd0 [ 2291.514392][ T6060] ? _raw_spin_lock+0xa1/0x170 [ 2291.519124][ T6060] ? _raw_spin_trylock_bh+0x190/0x190 [ 2291.524486][ T6060] ? avc_denied+0x1c0/0x1c0 [ 2291.529003][ T6060] ? memset+0x1f/0x40 [ 2291.532973][ T6060] ? unwind_next_frame+0x1c07/0x22b0 [ 2291.538239][ T6060] ? arch_stack_walk+0x78/0xe0 [ 2291.543016][ T6060] ? unwind_get_return_address_ptr+0x130/0x130 [ 2291.549167][ T6060] ? memset+0x1f/0x40 [ 2291.553131][ T6060] ? unwind_next_frame+0x1c07/0x22b0 [ 2291.558385][ T6060] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2291.564421][ T6060] ? lo_release+0x1e0/0x1e0 [ 2291.568897][ T6060] blkdev_ioctl+0x89a/0x2c30 [ 2291.573470][ T6060] ? 0xffffffffa0128000 [ 2291.577593][ T6060] ? is_bpf_text_address+0x290/0x2b0 [ 2291.582845][ T6060] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2291.588096][ T6060] ? stack_trace_save+0x1e0/0x1e0 [ 2291.593096][ T6060] ? __kernel_text_address+0x93/0x110 [ 2291.598443][ T6060] ? unwind_get_return_address+0x48/0x90 [ 2291.604059][ T6060] ? arch_stack_walk+0x98/0xe0 [ 2291.608799][ T6060] ? __rcu_read_lock+0x50/0x50 [ 2291.613541][ T6060] ? avc_has_extended_perms+0x69e/0x10c0 [ 2291.619146][ T6060] ? avc_has_extended_perms+0xb25/0x10c0 [ 2291.624755][ T6060] ? avc_ss_reset+0x3a0/0x3a0 [ 2291.629405][ T6060] ? kmem_cache_free+0xac/0x5c0 [ 2291.634227][ T6060] ? __kasan_slab_free+0x1e2/0x220 [ 2291.639303][ T6060] ? __kasan_slab_free+0x168/0x220 [ 2291.644398][ T6060] ? slab_free_freelist_hook+0xd0/0x150 [ 2291.649910][ T6060] ? kmem_cache_free+0xac/0x5c0 [ 2291.654742][ T6060] ? do_sys_open+0x4a3/0x620 [ 2291.659302][ T6060] ? do_syscall_64+0xcb/0x150 [ 2291.663948][ T6060] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2291.669995][ T6060] ? __kasan_kmalloc+0x117/0x1b0 [ 2291.674900][ T6060] ? kmem_cache_alloc+0x1d5/0x250 [ 2291.679895][ T6060] ? getname_flags+0xb8/0x610 [ 2291.684558][ T6060] ? do_sys_open+0x2fc/0x620 [ 2291.689115][ T6060] ? do_syscall_64+0xcb/0x150 [ 2291.693774][ T6060] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2291.699811][ T6060] ? generic_file_write_iter+0x4f6/0x650 [ 2291.705412][ T6060] block_ioctl+0xb6/0xf0 [ 2291.709623][ T6060] ? blkdev_iopoll+0xf0/0xf0 [ 2291.714188][ T6060] do_vfs_ioctl+0x746/0x16f0 [ 2291.718761][ T6060] ? selinux_file_ioctl+0x6e4/0x920 [ 2291.723940][ T6060] ? ioctl_preallocate+0x240/0x240 [ 2291.729022][ T6060] ? slab_free_freelist_hook+0xd0/0x150 [ 2291.734553][ T6060] ? __fget+0x37c/0x3c0 [ 2291.738685][ T6060] ? fget_many+0x20/0x20 [ 2291.742927][ T6060] ? __fpregs_load_activate+0x2d3/0x390 [ 2291.748447][ T6060] ? common_interrupt+0xa/0xf [ 2291.753112][ T6060] ? security_file_ioctl+0xad/0xc0 [ 2291.758199][ T6060] __x64_sys_ioctl+0xd4/0x110 [ 2291.762846][ T6060] do_syscall_64+0xcb/0x150 [ 2291.767319][ T6060] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2291.773179][ T6060] RIP: 0033:0x45dcc7 [ 2291.777056][ T6060] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2291.796637][ T6060] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2291.805017][ T6060] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 18:55:11 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000007a40000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:11 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020a000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2291.812973][ T6060] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2291.820915][ T6060] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2291.828864][ T6060] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2291.836819][ T6060] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 18:55:11 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020b000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:11 executing program 4 (fault-call:0 fault-nth:17): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2291.895332][ T6060] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2291.951484][ T6063] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2291.963297][ T6063] EXT4-fs (loop3): get root inode failed [ 2291.969003][ T6063] EXT4-fs (loop3): mount failed [ 2292.068444][ T6087] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2292.095110][ T6092] FAULT_INJECTION: forcing a failure. [ 2292.095110][ T6092] name failslab, interval 1, probability 0, space 0, times 0 [ 2292.107781][ T6092] CPU: 0 PID: 6092 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2292.117815][ T6092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2292.127840][ T6092] Call Trace: [ 2292.131106][ T6092] dump_stack+0x1b0/0x21e [ 2292.135406][ T6092] ? devkmsg_release+0x11c/0x11c [ 2292.140312][ T6092] ? mutex_unlock+0x19/0x40 [ 2292.144790][ T6092] ? show_regs_print_info+0x12/0x12 [ 2292.149962][ T6092] ? selinux_kernfs_init_security+0x10a/0x700 [ 2292.155996][ T6092] ? idr_get_free+0x6de/0x880 [ 2292.160645][ T6092] should_fail+0x6fb/0x860 [ 2292.165040][ T6092] ? setup_fault_attr+0x2b0/0x2b0 [ 2292.170045][ T6092] ? selinux_kernfs_init_security+0x10a/0x700 [ 2292.176094][ T6092] ? _raw_spin_lock+0xa1/0x170 [ 2292.180838][ T6092] ? __kernfs_new_node+0xdb/0x6e0 [ 2292.185846][ T6092] should_failslab+0x5/0x20 [ 2292.190332][ T6092] kmem_cache_alloc+0x36/0x250 [ 2292.195069][ T6092] __kernfs_new_node+0xdb/0x6e0 [ 2292.199890][ T6092] ? mutex_lock+0xa6/0x110 [ 2292.204275][ T6092] ? kernfs_new_node+0x160/0x160 [ 2292.209185][ T6092] ? security_kernfs_init_security+0x9a/0xb0 [ 2292.215135][ T6092] ? kernfs_activate+0x43c/0x460 [ 2292.220040][ T6092] kernfs_new_node+0x95/0x160 [ 2292.224703][ T6092] __kernfs_create_file+0x45/0x260 [ 2292.229787][ T6092] sysfs_add_file_mode_ns+0x293/0x340 [ 2292.235156][ T6092] internal_create_group+0x511/0xe40 [ 2292.240439][ T6092] ? _raw_spin_unlock+0x5/0x20 [ 2292.245180][ T6092] ? sysfs_create_group+0x20/0x20 [ 2292.250182][ T6092] ? ___preempt_schedule+0x16/0x20 [ 2292.255331][ T6092] ? __loop_update_dio+0x23d/0x580 [ 2292.260522][ T6092] loop_configure+0xdd7/0x1380 [ 2292.265266][ T6092] lo_ioctl+0x781/0x22e0 [ 2292.269482][ T6092] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2292.275520][ T6092] ? lo_release+0x1e0/0x1e0 [ 2292.279994][ T6092] ? unwind_get_return_address_ptr+0x130/0x130 [ 2292.286113][ T6092] ? 0xffffffffa0128000 [ 2292.290245][ T6092] ? is_bpf_text_address+0x290/0x2b0 [ 2292.295521][ T6092] ? stack_trace_save+0x1e0/0x1e0 [ 2292.300524][ T6092] ? __kernel_text_address+0x93/0x110 [ 2292.305865][ T6092] ? unwind_get_return_address+0x48/0x90 [ 2292.311466][ T6092] ? arch_stack_walk+0x98/0xe0 [ 2292.316247][ T6092] ? stack_trace_save+0x111/0x1e0 [ 2292.321252][ T6092] ? stack_trace_snprint+0x150/0x150 [ 2292.326511][ T6092] ? arch_stack_walk+0x78/0xe0 [ 2292.331257][ T6092] ? __rcu_read_lock+0x50/0x50 [ 2292.335991][ T6092] ? __kasan_kmalloc+0x179/0x1b0 [ 2292.340908][ T6092] ? __perf_event_task_sched_out+0x1127/0x1250 [ 2292.347048][ T6092] ? __perf_event_task_sched_out+0x1127/0x1250 [ 2292.353172][ T6092] ? __perf_event_task_sched_in+0x4ed/0x550 [ 2292.359034][ T6092] ? perf_pmu_sched_task+0x370/0x370 [ 2292.364286][ T6092] ? switch_mm_irqs_off+0x46e/0x870 [ 2292.369451][ T6092] ? switch_mm+0xe0/0xe0 [ 2292.373665][ T6092] ? _raw_spin_unlock_irq+0x5/0x20 [ 2292.378743][ T6092] ? finish_task_switch+0x235/0x4c0 [ 2292.383910][ T6092] ? __schedule+0x8ae/0xe30 [ 2292.388420][ T6092] ? is_mmconf_reserved+0x420/0x420 [ 2292.393588][ T6092] ? preempt_schedule_irq+0xc7/0x110 [ 2292.398843][ T6092] ? preempt_schedule_notrace+0x110/0x110 [ 2292.404529][ T6092] ? retint_kernel+0x1b/0x1b [ 2292.409094][ T6092] ? memset+0x1f/0x40 [ 2292.413060][ T6092] ? unwind_next_frame+0x1c07/0x22b0 [ 2292.418314][ T6092] ? arch_stack_walk+0x78/0xe0 [ 2292.423047][ T6092] ? unwind_get_return_address_ptr+0x130/0x130 [ 2292.429190][ T6092] ? memset+0x1f/0x40 [ 2292.433145][ T6092] ? unwind_next_frame+0x1c07/0x22b0 [ 2292.438398][ T6092] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2292.444447][ T6092] ? lo_release+0x1e0/0x1e0 [ 2292.448921][ T6092] blkdev_ioctl+0x89a/0x2c30 [ 2292.453479][ T6092] ? 0xffffffffa0128000 [ 2292.457605][ T6092] ? is_bpf_text_address+0x290/0x2b0 [ 2292.462875][ T6092] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2292.468132][ T6092] ? stack_trace_save+0x1e0/0x1e0 [ 2292.473126][ T6092] ? __kernel_text_address+0x93/0x110 [ 2292.478464][ T6092] ? unwind_get_return_address+0x48/0x90 [ 2292.484066][ T6092] ? arch_stack_walk+0x98/0xe0 [ 2292.488800][ T6092] ? __rcu_read_lock+0x50/0x50 [ 2292.493575][ T6092] ? avc_has_extended_perms+0x69e/0x10c0 [ 2292.499191][ T6092] ? avc_has_extended_perms+0xb25/0x10c0 [ 2292.504790][ T6092] ? avc_ss_reset+0x3a0/0x3a0 [ 2292.509441][ T6092] ? kmem_cache_free+0xac/0x5c0 [ 2292.514260][ T6092] ? __kasan_slab_free+0x1e2/0x220 [ 2292.519354][ T6092] ? __kasan_slab_free+0x168/0x220 [ 2292.524433][ T6092] ? slab_free_freelist_hook+0xd0/0x150 [ 2292.529947][ T6092] ? kmem_cache_free+0xac/0x5c0 [ 2292.534768][ T6092] ? do_sys_open+0x4a3/0x620 [ 2292.539327][ T6092] ? do_syscall_64+0xcb/0x150 [ 2292.543969][ T6092] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2292.550016][ T6092] ? __kasan_kmalloc+0x117/0x1b0 [ 2292.554922][ T6092] ? kmem_cache_alloc+0x1d5/0x250 [ 2292.559914][ T6092] ? getname_flags+0xb8/0x610 [ 2292.564574][ T6092] ? do_sys_open+0x2fc/0x620 [ 2292.569131][ T6092] ? do_syscall_64+0xcb/0x150 [ 2292.573780][ T6092] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2292.579818][ T6092] ? generic_file_write_iter+0x4f6/0x650 [ 2292.585418][ T6092] block_ioctl+0xb6/0xf0 [ 2292.589643][ T6092] ? blkdev_iopoll+0xf0/0xf0 [ 2292.594225][ T6092] do_vfs_ioctl+0x746/0x16f0 [ 2292.598792][ T6092] ? selinux_file_ioctl+0x6e4/0x920 [ 2292.603957][ T6092] ? ioctl_preallocate+0x240/0x240 [ 2292.609036][ T6092] ? slab_free_freelist_hook+0xd0/0x150 [ 2292.614547][ T6092] ? __fget+0x37c/0x3c0 [ 2292.618684][ T6092] ? fget_many+0x20/0x20 [ 2292.622894][ T6092] ? __fpregs_load_activate+0x2d3/0x390 [ 2292.628405][ T6092] ? security_file_ioctl+0xad/0xc0 [ 2292.633485][ T6092] __x64_sys_ioctl+0xd4/0x110 [ 2292.638133][ T6092] do_syscall_64+0xcb/0x150 [ 2292.642608][ T6092] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2292.648486][ T6092] RIP: 0033:0x45dcc7 18:55:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x3000000) 18:55:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x5000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:12 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000009440000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020c000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2292.652365][ T6092] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2292.671938][ T6092] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2292.680318][ T6092] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2292.688274][ T6092] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2292.696215][ T6092] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2292.704156][ T6092] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2292.712095][ T6092] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 18:55:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020d000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020e000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0210000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0211000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0212000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000009540000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 4 (fault-call:0 fault-nth:18): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2292.839616][ T6092] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2292.861785][ T6101] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2292.888396][ T6101] EXT4-fs (loop3): get root inode failed [ 2292.895087][ T6101] EXT4-fs (loop3): mount failed [ 2292.940565][ T6117] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0218000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:12 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x4000000) 18:55:12 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000009840000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:12 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0222000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2293.031995][ T6125] FAULT_INJECTION: forcing a failure. [ 2293.031995][ T6125] name failslab, interval 1, probability 0, space 0, times 0 [ 2293.046298][ T6125] CPU: 1 PID: 6125 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2293.056342][ T6125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.066366][ T6125] Call Trace: [ 2293.069631][ T6125] dump_stack+0x1b0/0x21e [ 2293.073940][ T6125] ? devkmsg_release+0x11c/0x11c [ 2293.078867][ T6125] ? mutex_unlock+0x19/0x40 [ 2293.083343][ T6125] ? show_regs_print_info+0x12/0x12 [ 2293.088513][ T6125] ? selinux_kernfs_init_security+0x10a/0x700 [ 2293.094552][ T6125] ? idr_get_free+0x6de/0x880 [ 2293.099199][ T6125] should_fail+0x6fb/0x860 [ 2293.103598][ T6125] ? setup_fault_attr+0x2b0/0x2b0 [ 2293.108597][ T6125] ? selinux_kernfs_init_security+0x10a/0x700 [ 2293.114650][ T6125] ? _raw_spin_lock+0xa1/0x170 [ 2293.119388][ T6125] ? __kernfs_new_node+0xdb/0x6e0 [ 2293.124380][ T6125] should_failslab+0x5/0x20 [ 2293.128854][ T6125] kmem_cache_alloc+0x36/0x250 [ 2293.133595][ T6125] __kernfs_new_node+0xdb/0x6e0 [ 2293.138417][ T6125] ? mutex_lock+0xa6/0x110 [ 2293.142806][ T6125] ? kernfs_new_node+0x160/0x160 [ 2293.147723][ T6125] ? security_kernfs_init_security+0x9a/0xb0 [ 2293.153697][ T6125] ? kernfs_activate+0x43c/0x460 [ 2293.158603][ T6125] kernfs_new_node+0x95/0x160 [ 2293.163261][ T6125] __kernfs_create_file+0x45/0x260 [ 2293.168351][ T6125] sysfs_add_file_mode_ns+0x293/0x340 [ 2293.173693][ T6125] internal_create_group+0x511/0xe40 [ 2293.178948][ T6125] ? _raw_spin_unlock+0x5/0x20 [ 2293.183680][ T6125] ? sysfs_create_group+0x20/0x20 [ 2293.188689][ T6125] ? __loop_update_dio+0x23d/0x580 [ 2293.193768][ T6125] loop_configure+0xdd7/0x1380 [ 2293.198502][ T6125] lo_ioctl+0x781/0x22e0 [ 2293.202716][ T6125] ? lo_release+0x1e0/0x1e0 [ 2293.207197][ T6125] ? unwind_get_return_address+0x48/0x90 [ 2293.212816][ T6125] ? update_blocked_averages+0xea0/0xea0 [ 2293.218437][ T6125] ? arch_stack_walk+0x98/0xe0 [ 2293.223173][ T6125] ? _raw_spin_lock+0xa1/0x170 [ 2293.227911][ T6125] ? _raw_spin_trylock_bh+0x190/0x190 [ 2293.233263][ T6125] ? kvm_sched_clock_read+0x15/0x40 [ 2293.238448][ T6125] ? sched_clock+0x5/0x10 [ 2293.242752][ T6125] ? __rcu_read_lock+0x50/0x50 [ 2293.247525][ T6125] ? update_load_avg+0x410/0x8f0 [ 2293.252449][ T6125] ? enqueue_entity+0x74f/0xd80 [ 2293.257291][ T6125] ? check_preempt_wakeup+0x6fc/0xd60 [ 2293.262635][ T6125] ? ttwu_do_wakeup+0x154/0x5b0 [ 2293.267500][ T6125] ? _raw_spin_unlock+0x5/0x20 [ 2293.272233][ T6125] ? ttwu_queue+0x243/0x380 [ 2293.276713][ T6125] ? psi_ttwu_dequeue+0x320/0x320 [ 2293.281729][ T6125] ? try_to_wake_up+0xbe8/0xd80 [ 2293.286551][ T6125] ? cpus_share_cache+0xd0/0xd0 [ 2293.291377][ T6125] ? _raw_spin_lock+0xa1/0x170 [ 2293.296113][ T6125] ? _raw_spin_trylock_bh+0x190/0x190 [ 2293.301497][ T6125] ? memset+0x1f/0x40 [ 2293.305453][ T6125] ? unwind_next_frame+0x1c07/0x22b0 [ 2293.310718][ T6125] ? arch_stack_walk+0x78/0xe0 [ 2293.315464][ T6125] ? unwind_get_return_address_ptr+0x130/0x130 [ 2293.321588][ T6125] ? memset+0x1f/0x40 [ 2293.325542][ T6125] ? unwind_next_frame+0x1c07/0x22b0 [ 2293.330796][ T6125] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2293.336873][ T6125] ? lo_release+0x1e0/0x1e0 [ 2293.341350][ T6125] blkdev_ioctl+0x89a/0x2c30 [ 2293.345915][ T6125] ? 0xffffffffa0128000 [ 2293.350039][ T6125] ? is_bpf_text_address+0x290/0x2b0 [ 2293.355297][ T6125] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2293.360561][ T6125] ? stack_trace_save+0x1e0/0x1e0 [ 2293.365564][ T6125] ? __kernel_text_address+0x93/0x110 [ 2293.370913][ T6125] ? unwind_get_return_address+0x48/0x90 [ 2293.376514][ T6125] ? arch_stack_walk+0x98/0xe0 [ 2293.381264][ T6125] ? __rcu_read_lock+0x50/0x50 [ 2293.386005][ T6125] ? avc_has_extended_perms+0x69e/0x10c0 [ 2293.391604][ T6125] ? avc_has_extended_perms+0xb25/0x10c0 [ 2293.397206][ T6125] ? avc_ss_reset+0x3a0/0x3a0 [ 2293.401854][ T6125] ? kmem_cache_free+0xac/0x5c0 [ 2293.406671][ T6125] ? __kasan_slab_free+0x1e2/0x220 [ 2293.411746][ T6125] ? __kasan_slab_free+0x168/0x220 [ 2293.416826][ T6125] ? slab_free_freelist_hook+0xd0/0x150 [ 2293.422424][ T6125] ? kmem_cache_free+0xac/0x5c0 [ 2293.427243][ T6125] ? do_sys_open+0x4a3/0x620 [ 2293.431819][ T6125] ? do_syscall_64+0xcb/0x150 [ 2293.436481][ T6125] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2293.442516][ T6125] ? __kasan_kmalloc+0x117/0x1b0 [ 2293.447422][ T6125] ? kmem_cache_alloc+0x1d5/0x250 [ 2293.452414][ T6125] ? getname_flags+0xb8/0x610 [ 2293.457059][ T6125] ? do_sys_open+0x2fc/0x620 [ 2293.461616][ T6125] ? do_syscall_64+0xcb/0x150 [ 2293.466263][ T6125] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2293.472301][ T6125] ? generic_file_write_iter+0x4f6/0x650 [ 2293.477903][ T6125] block_ioctl+0xb6/0xf0 [ 2293.482117][ T6125] ? blkdev_iopoll+0xf0/0xf0 [ 2293.486675][ T6125] do_vfs_ioctl+0x746/0x16f0 [ 2293.491242][ T6125] ? selinux_file_ioctl+0x6e4/0x920 [ 2293.496411][ T6125] ? ioctl_preallocate+0x240/0x240 [ 2293.501495][ T6125] ? slab_free_freelist_hook+0xd0/0x150 [ 2293.507044][ T6125] ? __fget+0x37c/0x3c0 [ 2293.511172][ T6125] ? fget_many+0x20/0x20 [ 2293.515385][ T6125] ? __fpregs_load_activate+0x2d3/0x390 [ 2293.520917][ T6125] ? security_file_ioctl+0xad/0xc0 [ 2293.526004][ T6125] __x64_sys_ioctl+0xd4/0x110 [ 2293.530665][ T6125] do_syscall_64+0xcb/0x150 [ 2293.535137][ T6125] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2293.541009][ T6125] RIP: 0033:0x45dcc7 [ 2293.544872][ T6125] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2293.564461][ T6125] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2293.572841][ T6125] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 18:55:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0225000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0248000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e024c000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2293.580783][ T6125] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2293.588743][ T6125] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2293.596700][ T6125] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2293.604662][ T6125] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 18:55:13 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000002000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x7000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2293.677692][ T6125] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2293.687727][ T6133] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2293.699929][ T6133] EXT4-fs (loop3): get root inode failed [ 2293.706211][ T6133] EXT4-fs (loop3): mount failed 18:55:13 executing program 4 (fault-call:0 fault-nth:19): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0260000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0268000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e026c000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2293.790196][ T6133] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2293.802019][ T6133] EXT4-fs (loop3): get root inode failed [ 2293.808259][ T6133] EXT4-fs (loop3): mount failed 18:55:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x5000000) 18:55:13 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:13 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000003000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:13 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0274000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x8000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2293.899775][ T6168] FAULT_INJECTION: forcing a failure. [ 2293.899775][ T6168] name failslab, interval 1, probability 0, space 0, times 0 [ 2293.919524][ T6168] CPU: 1 PID: 6168 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2293.929594][ T6168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2293.939628][ T6168] Call Trace: [ 2293.942905][ T6168] dump_stack+0x1b0/0x21e [ 2293.947213][ T6168] ? devkmsg_release+0x11c/0x11c [ 2293.952133][ T6168] ? mutex_unlock+0x19/0x40 [ 2293.956608][ T6168] ? show_regs_print_info+0x12/0x12 [ 2293.961776][ T6168] ? selinux_kernfs_init_security+0x10a/0x700 [ 2293.967814][ T6168] should_fail+0x6fb/0x860 [ 2293.972207][ T6168] ? setup_fault_attr+0x2b0/0x2b0 [ 2293.977202][ T6168] ? selinux_kernfs_init_security+0x10a/0x700 [ 2293.983247][ T6168] ? _raw_spin_lock+0xa1/0x170 [ 2293.988005][ T6168] ? __kernfs_new_node+0xdb/0x6e0 [ 2293.993008][ T6168] should_failslab+0x5/0x20 [ 2293.997479][ T6168] kmem_cache_alloc+0x36/0x250 [ 2294.002235][ T6168] __kernfs_new_node+0xdb/0x6e0 [ 2294.007061][ T6168] ? mutex_lock+0xa6/0x110 [ 2294.011442][ T6168] ? kernfs_new_node+0x160/0x160 [ 2294.016352][ T6168] ? security_kernfs_init_security+0x9a/0xb0 [ 2294.022310][ T6168] ? kernfs_activate+0x43c/0x460 [ 2294.027217][ T6168] kernfs_new_node+0x95/0x160 [ 2294.031861][ T6168] __kernfs_create_file+0x45/0x260 [ 2294.036940][ T6168] sysfs_add_file_mode_ns+0x293/0x340 [ 2294.042307][ T6168] internal_create_group+0x511/0xe40 [ 2294.047562][ T6168] ? _raw_spin_unlock+0x5/0x20 [ 2294.052294][ T6168] ? sysfs_create_group+0x20/0x20 [ 2294.057304][ T6168] ? ___preempt_schedule+0x16/0x20 [ 2294.062385][ T6168] ? __loop_update_dio+0x23d/0x580 [ 2294.067489][ T6168] loop_configure+0xdd7/0x1380 [ 2294.072228][ T6168] lo_ioctl+0x781/0x22e0 [ 2294.076444][ T6168] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2294.082479][ T6168] ? lo_release+0x1e0/0x1e0 [ 2294.086969][ T6168] ? unwind_get_return_address_ptr+0x130/0x130 [ 2294.093088][ T6168] ? 0xffffffffa0128000 [ 2294.097228][ T6168] ? is_bpf_text_address+0x290/0x2b0 [ 2294.102497][ T6168] ? stack_trace_save+0x1e0/0x1e0 [ 2294.107490][ T6168] ? __kernel_text_address+0x93/0x110 [ 2294.112848][ T6168] ? unwind_get_return_address+0x48/0x90 [ 2294.118449][ T6168] ? arch_stack_walk+0x98/0xe0 [ 2294.123185][ T6168] ? stack_trace_save+0x111/0x1e0 [ 2294.128185][ T6168] ? stack_trace_snprint+0x150/0x150 [ 2294.133479][ T6168] ? arch_stack_walk+0x78/0xe0 [ 2294.138251][ T6168] ? __perf_event_task_sched_out+0x1127/0x1250 [ 2294.144373][ T6168] ? __perf_event_task_sched_in+0x4ed/0x550 [ 2294.150237][ T6168] ? perf_pmu_sched_task+0x370/0x370 [ 2294.155491][ T6168] ? switch_mm_irqs_off+0x46e/0x870 [ 2294.160681][ T6168] ? switch_mm+0xe0/0xe0 [ 2294.164902][ T6168] ? finish_task_switch+0x2be/0x4c0 [ 2294.170093][ T6168] ? __schedule+0x8ae/0xe30 [ 2294.174566][ T6168] ? is_mmconf_reserved+0x420/0x420 [ 2294.179735][ T6168] ? ttwu_do_wakeup+0x154/0x5b0 [ 2294.184563][ T6168] ? preempt_schedule+0xeb/0x110 [ 2294.189472][ T6168] ? schedule_preempt_disabled+0x20/0x20 [ 2294.195075][ T6168] ? ___preempt_schedule+0x16/0x20 [ 2294.200167][ T6168] ? ttwu_do_wakeup+0x154/0x5b0 [ 2294.204987][ T6168] ? try_to_wake_up+0xc39/0xd80 [ 2294.209805][ T6168] ? cpus_share_cache+0xd0/0xd0 [ 2294.214622][ T6168] ? _raw_spin_lock+0xa1/0x170 [ 2294.219371][ T6168] ? _raw_spin_trylock_bh+0x190/0x190 [ 2294.224715][ T6168] ? memset+0x1f/0x40 [ 2294.228666][ T6168] ? unwind_next_frame+0x1c07/0x22b0 [ 2294.233923][ T6168] ? arch_stack_walk+0x78/0xe0 [ 2294.238654][ T6168] ? unwind_get_return_address_ptr+0x130/0x130 [ 2294.244774][ T6168] ? memset+0x1f/0x40 [ 2294.248721][ T6168] ? unwind_next_frame+0x1c07/0x22b0 [ 2294.253974][ T6168] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2294.260017][ T6168] ? lo_release+0x1e0/0x1e0 [ 2294.264491][ T6168] blkdev_ioctl+0x89a/0x2c30 [ 2294.269052][ T6168] ? 0xffffffffa0128000 [ 2294.273178][ T6168] ? is_bpf_text_address+0x290/0x2b0 [ 2294.278471][ T6168] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2294.283745][ T6168] ? stack_trace_save+0x1e0/0x1e0 [ 2294.288738][ T6168] ? __kernel_text_address+0x93/0x110 [ 2294.294101][ T6168] ? unwind_get_return_address+0x48/0x90 [ 2294.299723][ T6168] ? arch_stack_walk+0x98/0xe0 [ 2294.304457][ T6168] ? __rcu_read_lock+0x50/0x50 [ 2294.309192][ T6168] ? avc_has_extended_perms+0x69e/0x10c0 [ 2294.314792][ T6168] ? avc_has_extended_perms+0xb25/0x10c0 [ 2294.320393][ T6168] ? avc_ss_reset+0x3a0/0x3a0 [ 2294.325057][ T6168] ? kmem_cache_free+0xac/0x5c0 [ 2294.329873][ T6168] ? __kasan_slab_free+0x1e2/0x220 [ 2294.334948][ T6168] ? __kasan_slab_free+0x168/0x220 [ 2294.340028][ T6168] ? slab_free_freelist_hook+0xd0/0x150 [ 2294.345539][ T6168] ? kmem_cache_free+0xac/0x5c0 [ 2294.350355][ T6168] ? do_sys_open+0x4a3/0x620 [ 2294.354914][ T6168] ? do_syscall_64+0xcb/0x150 [ 2294.359564][ T6168] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2294.365597][ T6168] ? __kasan_kmalloc+0x117/0x1b0 [ 2294.370500][ T6168] ? kmem_cache_alloc+0x1d5/0x250 [ 2294.375492][ T6168] ? getname_flags+0xb8/0x610 [ 2294.380147][ T6168] ? do_sys_open+0x2fc/0x620 [ 2294.384704][ T6168] ? do_syscall_64+0xcb/0x150 [ 2294.389350][ T6168] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2294.395387][ T6168] ? generic_file_write_iter+0x4f6/0x650 [ 2294.401004][ T6168] block_ioctl+0xb6/0xf0 [ 2294.405214][ T6168] ? blkdev_iopoll+0xf0/0xf0 [ 2294.409771][ T6168] do_vfs_ioctl+0x746/0x16f0 [ 2294.414331][ T6168] ? selinux_file_ioctl+0x6e4/0x920 [ 2294.419583][ T6168] ? ioctl_preallocate+0x240/0x240 [ 2294.424663][ T6168] ? slab_free_freelist_hook+0xd0/0x150 [ 2294.430177][ T6168] ? __fget+0x37c/0x3c0 [ 2294.434301][ T6168] ? fget_many+0x20/0x20 [ 2294.438511][ T6168] ? __fpregs_load_activate+0x2d3/0x390 [ 2294.444024][ T6168] ? security_file_ioctl+0xad/0xc0 [ 2294.449106][ T6168] __x64_sys_ioctl+0xd4/0x110 [ 2294.453756][ T6168] do_syscall_64+0xcb/0x150 [ 2294.458257][ T6168] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2294.464121][ T6168] RIP: 0033:0x45dcc7 [ 2294.468002][ T6168] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2294.487591][ T6168] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 18:55:14 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e027a000000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2294.495970][ T6168] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2294.503916][ T6168] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2294.511856][ T6168] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2294.519802][ T6168] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2294.527745][ T6168] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 18:55:14 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0261010000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:14 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e026d010000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:14 executing program 4 (fault-call:0 fault-nth:20): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:14 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0279010000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:14 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000004000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:14 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x6000000) 18:55:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x9000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2294.652760][ T6175] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2294.664726][ T6175] EXT4-fs (loop3): get root inode failed [ 2294.670417][ T6175] EXT4-fs (loop3): mount failed [ 2294.885238][ T6175] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2294.897476][ T6175] EXT4-fs (loop3): get root inode failed [ 2294.903608][ T6175] EXT4-fs (loop3): mount failed [ 2294.964593][ T6204] FAULT_INJECTION: forcing a failure. [ 2294.964593][ T6204] name failslab, interval 1, probability 0, space 0, times 0 [ 2294.977426][ T6204] CPU: 1 PID: 6204 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2294.987705][ T6204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2294.997744][ T6204] Call Trace: [ 2295.001042][ T6204] dump_stack+0x1b0/0x21e [ 2295.005376][ T6204] ? devkmsg_release+0x11c/0x11c [ 2295.010281][ T6204] ? mutex_unlock+0x19/0x40 [ 2295.014802][ T6204] ? show_regs_print_info+0x12/0x12 [ 2295.019972][ T6204] ? selinux_kernfs_init_security+0x10a/0x700 [ 2295.026007][ T6204] ? idr_get_free+0x6de/0x880 [ 2295.030656][ T6204] should_fail+0x6fb/0x860 [ 2295.035043][ T6204] ? setup_fault_attr+0x2b0/0x2b0 [ 2295.040052][ T6204] ? _raw_spin_lock+0xa1/0x170 [ 2295.044793][ T6204] ? __kernfs_new_node+0xdb/0x6e0 [ 2295.049791][ T6204] should_failslab+0x5/0x20 [ 2295.054264][ T6204] kmem_cache_alloc+0x36/0x250 [ 2295.059008][ T6204] __kernfs_new_node+0xdb/0x6e0 [ 2295.063860][ T6204] ? mutex_lock+0xa6/0x110 [ 2295.068249][ T6204] ? kernfs_new_node+0x160/0x160 [ 2295.073165][ T6204] ? kernfs_activate+0x43c/0x460 [ 2295.078103][ T6204] kernfs_new_node+0x95/0x160 [ 2295.082749][ T6204] __kernfs_create_file+0x45/0x260 [ 2295.087831][ T6204] sysfs_add_file_mode_ns+0x293/0x340 [ 2295.093183][ T6204] internal_create_group+0x511/0xe40 [ 2295.098456][ T6204] ? _raw_spin_unlock+0x5/0x20 [ 2295.103197][ T6204] ? sysfs_create_group+0x20/0x20 [ 2295.108211][ T6204] ? ___preempt_schedule+0x16/0x20 [ 2295.113299][ T6204] ? __loop_update_dio+0x23d/0x580 [ 2295.118386][ T6204] loop_configure+0xdd7/0x1380 [ 2295.123121][ T6204] lo_ioctl+0x781/0x22e0 [ 2295.127351][ T6204] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2295.133386][ T6204] ? lo_release+0x1e0/0x1e0 [ 2295.137872][ T6204] ? unwind_get_return_address_ptr+0x130/0x130 [ 2295.143994][ T6204] ? 0xffffffffa0128000 [ 2295.148127][ T6204] ? is_bpf_text_address+0x290/0x2b0 [ 2295.153381][ T6204] ? stack_trace_save+0x1e0/0x1e0 [ 2295.158374][ T6204] ? __kernel_text_address+0x93/0x110 [ 2295.163720][ T6204] ? unwind_get_return_address+0x48/0x90 [ 2295.169323][ T6204] ? arch_stack_walk+0x98/0xe0 [ 2295.174056][ T6204] ? stack_trace_save+0x111/0x1e0 [ 2295.179053][ T6204] ? __perf_event_task_sched_out+0x1127/0x1250 [ 2295.185176][ T6204] ? __perf_event_task_sched_out+0x1127/0x1250 [ 2295.191297][ T6204] ? __perf_event_task_sched_in+0x4ed/0x550 [ 2295.197167][ T6204] ? speculation_ctrl_update_tif+0xe0/0xe0 [ 2295.202944][ T6204] ? perf_pmu_sched_task+0x370/0x370 [ 2295.208216][ T6204] ? switch_mm_irqs_off+0x46e/0x870 [ 2295.213394][ T6204] ? switch_mm+0xe0/0xe0 [ 2295.217653][ T6204] ? _raw_spin_unlock_irq+0x5/0x20 [ 2295.222899][ T6204] ? finish_task_switch+0x235/0x4c0 [ 2295.228106][ T6204] ? __schedule+0x8ae/0xe30 [ 2295.232582][ T6204] ? is_mmconf_reserved+0x420/0x420 [ 2295.237753][ T6204] ? ttwu_do_wakeup+0x154/0x5b0 [ 2295.242591][ T6204] ? preempt_schedule+0xeb/0x110 [ 2295.247498][ T6204] ? schedule_preempt_disabled+0x20/0x20 [ 2295.253101][ T6204] ? ___preempt_schedule+0x16/0x20 [ 2295.258286][ T6204] ? ttwu_do_wakeup+0x154/0x5b0 [ 2295.263112][ T6204] ? try_to_wake_up+0xc39/0xd80 [ 2295.267947][ T6204] ? cpus_share_cache+0xd0/0xd0 [ 2295.272779][ T6204] ? _raw_spin_lock+0xa1/0x170 [ 2295.277519][ T6204] ? _raw_spin_trylock_bh+0x190/0x190 [ 2295.282893][ T6204] ? avc_denied+0x1c0/0x1c0 [ 2295.287406][ T6204] ? memset+0x1f/0x40 [ 2295.291373][ T6204] ? unwind_next_frame+0x1c07/0x22b0 [ 2295.296638][ T6204] ? arch_stack_walk+0x78/0xe0 [ 2295.301461][ T6204] ? unwind_get_return_address_ptr+0x130/0x130 [ 2295.307606][ T6204] ? memset+0x1f/0x40 [ 2295.311564][ T6204] ? unwind_next_frame+0x1c07/0x22b0 [ 2295.316832][ T6204] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2295.322867][ T6204] ? lo_release+0x1e0/0x1e0 [ 2295.327339][ T6204] blkdev_ioctl+0x89a/0x2c30 [ 2295.331896][ T6204] ? 0xffffffffa0128000 [ 2295.336021][ T6204] ? is_bpf_text_address+0x290/0x2b0 [ 2295.341290][ T6204] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2295.346550][ T6204] ? stack_trace_save+0x1e0/0x1e0 [ 2295.351554][ T6204] ? __kernel_text_address+0x93/0x110 [ 2295.356892][ T6204] ? unwind_get_return_address+0x48/0x90 [ 2295.362508][ T6204] ? arch_stack_walk+0x98/0xe0 [ 2295.367240][ T6204] ? __rcu_read_lock+0x50/0x50 [ 2295.371972][ T6204] ? avc_has_extended_perms+0x69e/0x10c0 [ 2295.377583][ T6204] ? avc_has_extended_perms+0xb25/0x10c0 [ 2295.383201][ T6204] ? avc_ss_reset+0x3a0/0x3a0 [ 2295.387847][ T6204] ? kmem_cache_free+0xac/0x5c0 [ 2295.392664][ T6204] ? __kasan_slab_free+0x1e2/0x220 [ 2295.397740][ T6204] ? __kasan_slab_free+0x168/0x220 [ 2295.402820][ T6204] ? slab_free_freelist_hook+0xd0/0x150 [ 2295.408333][ T6204] ? kmem_cache_free+0xac/0x5c0 [ 2295.413150][ T6204] ? do_sys_open+0x4a3/0x620 [ 2295.417706][ T6204] ? do_syscall_64+0xcb/0x150 [ 2295.422350][ T6204] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2295.428382][ T6204] ? __kasan_kmalloc+0x117/0x1b0 [ 2295.433296][ T6204] ? kmem_cache_alloc+0x1d5/0x250 [ 2295.438328][ T6204] ? getname_flags+0xb8/0x610 [ 2295.442974][ T6204] ? do_sys_open+0x2fc/0x620 [ 2295.447530][ T6204] ? do_syscall_64+0xcb/0x150 [ 2295.452213][ T6204] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2295.458256][ T6204] ? generic_file_write_iter+0x4f6/0x650 [ 2295.463857][ T6204] block_ioctl+0xb6/0xf0 [ 2295.468073][ T6204] ? blkdev_iopoll+0xf0/0xf0 [ 2295.472633][ T6204] do_vfs_ioctl+0x746/0x16f0 [ 2295.477196][ T6204] ? selinux_file_ioctl+0x6e4/0x920 [ 2295.482366][ T6204] ? ioctl_preallocate+0x240/0x240 [ 2295.487462][ T6204] ? slab_free_freelist_hook+0xd0/0x150 [ 2295.492980][ T6204] ? __fget+0x37c/0x3c0 [ 2295.497109][ T6204] ? fget_many+0x20/0x20 [ 2295.501400][ T6204] ? __fpregs_load_activate+0x2d3/0x390 [ 2295.506923][ T6204] ? security_file_ioctl+0xad/0xc0 [ 2295.512007][ T6204] __x64_sys_ioctl+0xd4/0x110 [ 2295.516661][ T6204] do_syscall_64+0xcb/0x150 [ 2295.521186][ T6204] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2295.527114][ T6204] RIP: 0033:0x45dcc7 [ 2295.530977][ T6204] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2295.550553][ T6204] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2295.558936][ T6204] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 18:55:15 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:15 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02fe010000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:15 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000005000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xa000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:15 executing program 4 (fault-call:0 fault-nth:21): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x6040000) [ 2295.566878][ T6204] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2295.574818][ T6204] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2295.582766][ T6204] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2295.590728][ T6204] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 18:55:15 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0286020000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:15 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0292020000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:15 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e029e020000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:15 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000006000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xb000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:15 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200030000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2295.726802][ T6219] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2295.751089][ T6234] FAULT_INJECTION: forcing a failure. [ 2295.751089][ T6234] name failslab, interval 1, probability 0, space 0, times 0 [ 2295.757929][ T6219] EXT4-fs (loop3): get root inode failed [ 2295.766572][ T6234] CPU: 0 PID: 6234 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2295.772779][ T6219] EXT4-fs (loop3): mount failed [ 2295.779391][ T6234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2295.779394][ T6234] Call Trace: [ 2295.779415][ T6234] dump_stack+0x1b0/0x21e [ 2295.779433][ T6234] ? devkmsg_release+0x11c/0x11c [ 2295.779444][ T6234] ? mutex_unlock+0x19/0x40 [ 2295.779455][ T6234] ? show_regs_print_info+0x12/0x12 [ 2295.779467][ T6234] ? selinux_kernfs_init_security+0x10a/0x700 [ 2295.779484][ T6234] should_fail+0x6fb/0x860 [ 2295.826908][ T6234] ? setup_fault_attr+0x2b0/0x2b0 [ 2295.831901][ T6234] ? _raw_spin_lock+0xa1/0x170 [ 2295.836634][ T6234] ? __kernfs_new_node+0xdb/0x6e0 [ 2295.841642][ T6234] should_failslab+0x5/0x20 [ 2295.846123][ T6234] kmem_cache_alloc+0x36/0x250 [ 2295.850861][ T6234] __kernfs_new_node+0xdb/0x6e0 [ 2295.855681][ T6234] ? mutex_lock+0xa6/0x110 [ 2295.860064][ T6234] ? kernfs_new_node+0x160/0x160 [ 2295.864967][ T6234] ? kernfs_activate+0x43c/0x460 [ 2295.869871][ T6234] kernfs_new_node+0x95/0x160 [ 2295.874516][ T6234] __kernfs_create_file+0x45/0x260 [ 2295.879593][ T6234] sysfs_add_file_mode_ns+0x293/0x340 [ 2295.884933][ T6234] internal_create_group+0x511/0xe40 [ 2295.890308][ T6234] ? _raw_spin_unlock+0x5/0x20 [ 2295.895042][ T6234] ? sysfs_create_group+0x20/0x20 [ 2295.900034][ T6234] ? ___preempt_schedule+0x16/0x20 [ 2295.905129][ T6234] ? __loop_update_dio+0x23d/0x580 [ 2295.910207][ T6234] loop_configure+0xdd7/0x1380 [ 2295.914942][ T6234] lo_ioctl+0x781/0x22e0 [ 2295.919187][ T6234] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2295.925274][ T6234] ? lo_release+0x1e0/0x1e0 [ 2295.929745][ T6234] ? unwind_get_return_address_ptr+0x130/0x130 [ 2295.935881][ T6234] ? 0xffffffffa0128000 [ 2295.940006][ T6234] ? is_bpf_text_address+0x290/0x2b0 [ 2295.945259][ T6234] ? stack_trace_save+0x1e0/0x1e0 [ 2295.950269][ T6234] ? __kernel_text_address+0x93/0x110 [ 2295.955610][ T6234] ? unwind_get_return_address+0x48/0x90 [ 2295.961209][ T6234] ? arch_stack_walk+0x98/0xe0 [ 2295.965959][ T6234] ? stack_trace_save+0x111/0x1e0 [ 2295.970964][ T6234] ? stack_trace_snprint+0x150/0x150 [ 2295.976223][ T6234] ? arch_stack_walk+0x78/0xe0 [ 2295.980957][ T6234] ? __kasan_kmalloc+0x179/0x1b0 [ 2295.985862][ T6234] ? __kasan_kmalloc+0x117/0x1b0 [ 2295.990770][ T6234] ? kmem_cache_alloc+0x1d5/0x250 [ 2295.995778][ T6234] ? xas_create+0x4f9/0x1360 [ 2296.000334][ T6234] ? xas_create_range+0x137/0x630 [ 2296.005341][ T6234] ? shmem_add_to_page_cache+0x642/0xc10 [ 2296.010970][ T6234] ? shmem_getpage_gfp+0x14b6/0x2410 [ 2296.016242][ T6234] ? memset+0x1f/0x40 [ 2296.020197][ T6234] ? unwind_next_frame+0x1c07/0x22b0 [ 2296.025458][ T6234] ? arch_stack_walk+0x78/0xe0 [ 2296.030199][ T6234] ? unwind_get_return_address_ptr+0x130/0x130 [ 2296.036355][ T6234] ? memset+0x1f/0x40 [ 2296.040304][ T6234] ? unwind_next_frame+0x1c07/0x22b0 [ 2296.045557][ T6234] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2296.051592][ T6234] ? __rcu_read_lock+0x50/0x50 [ 2296.056338][ T6234] ? unwind_get_return_address_ptr+0x130/0x130 [ 2296.062460][ T6234] ? 0xffffffffa0128000 [ 2296.066604][ T6234] ? is_bpf_text_address+0x290/0x2b0 [ 2296.071857][ T6234] ? stack_trace_save+0x1e0/0x1e0 [ 2296.076848][ T6234] ? __kernel_text_address+0x93/0x110 [ 2296.082201][ T6234] ? __rcu_read_lock+0x50/0x50 [ 2296.086942][ T6234] ? unwind_get_return_address+0x48/0x90 [ 2296.092558][ T6234] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 2296.098155][ T6234] ? kobject_del+0x210/0x210 [ 2296.102711][ T6234] ? mutex_lock+0xa6/0x110 [ 2296.107109][ T6234] ? __module_put_and_exit+0x20/0x20 [ 2296.112378][ T6234] ? avc_denied+0x1c0/0x1c0 [ 2296.116858][ T6234] ? memset+0x1f/0x40 [ 2296.120815][ T6234] ? unwind_next_frame+0x1c07/0x22b0 [ 2296.126198][ T6234] ? arch_stack_walk+0x78/0xe0 [ 2296.130943][ T6234] ? unwind_get_return_address_ptr+0x130/0x130 [ 2296.137071][ T6234] ? memset+0x1f/0x40 [ 2296.141043][ T6234] ? unwind_next_frame+0x1c07/0x22b0 [ 2296.146298][ T6234] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2296.152336][ T6234] ? lo_release+0x1e0/0x1e0 [ 2296.156847][ T6234] blkdev_ioctl+0x89a/0x2c30 [ 2296.161415][ T6234] ? 0xffffffffa0128000 [ 2296.165580][ T6234] ? is_bpf_text_address+0x290/0x2b0 [ 2296.170881][ T6234] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2296.176135][ T6234] ? stack_trace_save+0x1e0/0x1e0 [ 2296.181129][ T6234] ? __kernel_text_address+0x93/0x110 [ 2296.186499][ T6234] ? unwind_get_return_address+0x48/0x90 [ 2296.192134][ T6234] ? arch_stack_walk+0x98/0xe0 [ 2296.196870][ T6234] ? __rcu_read_lock+0x50/0x50 [ 2296.201641][ T6234] ? avc_has_extended_perms+0x69e/0x10c0 [ 2296.207270][ T6234] ? avc_has_extended_perms+0xb25/0x10c0 [ 2296.212905][ T6234] ? avc_ss_reset+0x3a0/0x3a0 [ 2296.217558][ T6234] ? kmem_cache_free+0xac/0x5c0 [ 2296.222387][ T6234] ? __kasan_slab_free+0x1e2/0x220 [ 2296.227471][ T6234] ? __kasan_slab_free+0x168/0x220 [ 2296.232564][ T6234] ? slab_free_freelist_hook+0xd0/0x150 [ 2296.238077][ T6234] ? kmem_cache_free+0xac/0x5c0 [ 2296.242896][ T6234] ? do_sys_open+0x4a3/0x620 [ 2296.247459][ T6234] ? do_syscall_64+0xcb/0x150 [ 2296.252109][ T6234] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2296.258201][ T6234] ? __kasan_kmalloc+0x117/0x1b0 [ 2296.263125][ T6234] ? kmem_cache_alloc+0x1d5/0x250 [ 2296.268128][ T6234] ? getname_flags+0xb8/0x610 [ 2296.272785][ T6234] ? do_sys_open+0x2fc/0x620 [ 2296.277347][ T6234] ? do_syscall_64+0xcb/0x150 [ 2296.281999][ T6234] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2296.288036][ T6234] ? generic_file_write_iter+0x4f6/0x650 [ 2296.293638][ T6234] block_ioctl+0xb6/0xf0 [ 2296.297972][ T6234] ? blkdev_iopoll+0xf0/0xf0 [ 2296.302544][ T6234] do_vfs_ioctl+0x746/0x16f0 [ 2296.307119][ T6234] ? selinux_file_ioctl+0x6e4/0x920 [ 2296.312287][ T6234] ? ioctl_preallocate+0x240/0x240 [ 2296.317367][ T6234] ? slab_free_freelist_hook+0xd0/0x150 [ 2296.322882][ T6234] ? __fget+0x37c/0x3c0 [ 2296.327009][ T6234] ? fget_many+0x20/0x20 [ 2296.331219][ T6234] ? do_sys_open+0x4a3/0x620 [ 2296.335775][ T6234] ? file_open_root+0x440/0x440 [ 2296.340599][ T6234] ? security_file_ioctl+0xad/0xc0 [ 2296.345688][ T6234] __x64_sys_ioctl+0xd4/0x110 [ 2296.350334][ T6234] do_syscall_64+0xcb/0x150 [ 2296.354806][ T6234] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2296.360705][ T6234] RIP: 0033:0x45dcc7 [ 2296.364584][ T6234] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2296.384180][ T6234] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2296.392576][ T6234] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2296.400516][ T6234] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2296.408459][ T6234] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2296.416404][ T6234] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2296.424366][ T6234] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 18:55:16 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:16 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02f7030000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:16 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000007000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:16 executing program 4 (fault-call:0 fault-nth:22): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:16 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020b040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x7000000) 18:55:16 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0240040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xc000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:16 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000008000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:16 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0241040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:16 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0242040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2296.647717][ T6240] EXT4-fs: failed to create workqueue [ 2296.653288][ T6240] EXT4-fs (loop5): mount failed 18:55:16 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0243040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2296.813439][ T6267] FAULT_INJECTION: forcing a failure. [ 2296.813439][ T6267] name failslab, interval 1, probability 0, space 0, times 0 [ 2296.826246][ T6267] CPU: 0 PID: 6267 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2296.836309][ T6267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2296.846462][ T6267] Call Trace: [ 2296.849725][ T6267] dump_stack+0x1b0/0x21e [ 2296.854041][ T6267] ? devkmsg_release+0x11c/0x11c [ 2296.858949][ T6267] ? show_regs_print_info+0x12/0x12 [ 2296.864118][ T6267] ? kernfs_add_one+0x49e/0x5c0 [ 2296.868964][ T6267] should_fail+0x6fb/0x860 [ 2296.873369][ T6267] ? setup_fault_attr+0x2b0/0x2b0 [ 2296.878368][ T6267] ? kernfs_put+0x46/0x4b0 [ 2296.882767][ T6267] ? sysfs_add_file_mode_ns+0x2b4/0x340 [ 2296.888283][ T6267] ? kobject_uevent_env+0x266/0x1100 [ 2296.893546][ T6267] ? dev_uevent_filter+0xb0/0xb0 [ 2296.898585][ T6267] should_failslab+0x5/0x20 [ 2296.903073][ T6267] kmem_cache_alloc_trace+0x39/0x270 [ 2296.908339][ T6267] ? dev_uevent_filter+0xb0/0xb0 [ 2296.913253][ T6267] kobject_uevent_env+0x266/0x1100 [ 2296.918347][ T6267] ? _raw_spin_unlock+0x5/0x20 [ 2296.923083][ T6267] loop_configure+0xea1/0x1380 [ 2296.927833][ T6267] lo_ioctl+0x781/0x22e0 [ 2296.932053][ T6267] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2296.938115][ T6267] ? lo_release+0x1e0/0x1e0 [ 2296.942613][ T6267] ? unwind_get_return_address_ptr+0x130/0x130 [ 2296.948756][ T6267] ? 0xffffffffa0128000 [ 2296.952915][ T6267] ? is_bpf_text_address+0x290/0x2b0 [ 2296.958179][ T6267] ? stack_trace_save+0x1e0/0x1e0 [ 2296.963179][ T6267] ? __kernel_text_address+0x93/0x110 [ 2296.968526][ T6267] ? unwind_get_return_address+0x48/0x90 [ 2296.974144][ T6267] ? arch_stack_walk+0x98/0xe0 [ 2296.978878][ T6267] ? stack_trace_save+0x111/0x1e0 [ 2296.983872][ T6267] ? stack_trace_snprint+0x150/0x150 [ 2296.989127][ T6267] ? arch_stack_walk+0x78/0xe0 [ 2296.993874][ T6267] ? __kasan_kmalloc+0x179/0x1b0 [ 2296.998779][ T6267] ? __rcu_read_lock+0x50/0x50 [ 2297.003509][ T6267] ? __kasan_kmalloc+0x117/0x1b0 [ 2297.008432][ T6267] ? kmem_cache_alloc+0x1d5/0x250 [ 2297.013428][ T6267] ? xas_create+0x4f9/0x1360 [ 2297.018014][ T6267] ? __perf_event_task_sched_out+0x1127/0x1250 [ 2297.024139][ T6267] ? __perf_event_task_sched_in+0x4ed/0x550 [ 2297.030025][ T6267] ? perf_pmu_sched_task+0x370/0x370 [ 2297.035291][ T6267] ? nohz_balance_enter_idle+0x330/0x330 [ 2297.040957][ T6267] ? __rcu_read_lock+0x50/0x50 [ 2297.045701][ T6267] ? _raw_spin_unlock_irq+0x5/0x20 [ 2297.050800][ T6267] ? finish_task_switch+0x235/0x4c0 [ 2297.055986][ T6267] ? __schedule+0x8ae/0xe30 [ 2297.060544][ T6267] ? _raw_spin_lock_irqsave+0xda/0x1c0 [ 2297.065985][ T6267] ? _raw_spin_lock+0x170/0x170 [ 2297.070819][ T6267] ? _raw_spin_lock+0xa1/0x170 [ 2297.075571][ T6267] ? _raw_spin_trylock_bh+0x190/0x190 [ 2297.080911][ T6267] ? try_to_wake_up+0xbd2/0xd80 [ 2297.085731][ T6267] ? cpus_share_cache+0xd0/0xd0 [ 2297.090549][ T6267] ? _raw_spin_lock+0xa1/0x170 [ 2297.095282][ T6267] ? _raw_spin_trylock_bh+0x190/0x190 [ 2297.100622][ T6267] ? avc_denied+0x1c0/0x1c0 [ 2297.105104][ T6267] ? memset+0x1f/0x40 [ 2297.109063][ T6267] ? unwind_next_frame+0x1c07/0x22b0 [ 2297.114334][ T6267] ? arch_stack_walk+0x78/0xe0 [ 2297.119106][ T6267] ? unwind_get_return_address_ptr+0x130/0x130 [ 2297.125235][ T6267] ? memset+0x1f/0x40 [ 2297.129187][ T6267] ? unwind_next_frame+0x1c07/0x22b0 [ 2297.134459][ T6267] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2297.140496][ T6267] ? lo_release+0x1e0/0x1e0 [ 2297.144977][ T6267] blkdev_ioctl+0x89a/0x2c30 [ 2297.149535][ T6267] ? 0xffffffffa0128000 [ 2297.153661][ T6267] ? is_bpf_text_address+0x290/0x2b0 [ 2297.158918][ T6267] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2297.164192][ T6267] ? stack_trace_save+0x1e0/0x1e0 [ 2297.169183][ T6267] ? __kernel_text_address+0x93/0x110 [ 2297.174544][ T6267] ? unwind_get_return_address+0x48/0x90 [ 2297.180152][ T6267] ? arch_stack_walk+0x98/0xe0 [ 2297.184890][ T6267] ? __rcu_read_lock+0x50/0x50 [ 2297.189625][ T6267] ? avc_has_extended_perms+0x69e/0x10c0 [ 2297.195227][ T6267] ? avc_has_extended_perms+0xb25/0x10c0 [ 2297.200829][ T6267] ? avc_ss_reset+0x3a0/0x3a0 [ 2297.205482][ T6267] ? kmem_cache_free+0xac/0x5c0 [ 2297.210303][ T6267] ? __kasan_slab_free+0x1e2/0x220 [ 2297.215382][ T6267] ? __kasan_slab_free+0x168/0x220 [ 2297.220467][ T6267] ? slab_free_freelist_hook+0xd0/0x150 [ 2297.225998][ T6267] ? kmem_cache_free+0xac/0x5c0 [ 2297.230836][ T6267] ? do_sys_open+0x4a3/0x620 [ 2297.235407][ T6267] ? do_syscall_64+0xcb/0x150 [ 2297.240067][ T6267] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2297.246102][ T6267] ? __kasan_kmalloc+0x117/0x1b0 [ 2297.251011][ T6267] ? kmem_cache_alloc+0x1d5/0x250 [ 2297.256007][ T6267] ? getname_flags+0xb8/0x610 [ 2297.260657][ T6267] ? do_sys_open+0x2fc/0x620 [ 2297.265251][ T6267] ? do_syscall_64+0xcb/0x150 [ 2297.269898][ T6267] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2297.275935][ T6267] ? generic_file_write_iter+0x4f6/0x650 [ 2297.281542][ T6267] block_ioctl+0xb6/0xf0 [ 2297.285771][ T6267] ? blkdev_iopoll+0xf0/0xf0 [ 2297.290329][ T6267] do_vfs_ioctl+0x746/0x16f0 [ 2297.294904][ T6267] ? selinux_file_ioctl+0x6e4/0x920 [ 2297.300084][ T6267] ? ioctl_preallocate+0x240/0x240 [ 2297.305164][ T6267] ? slab_free_freelist_hook+0xd0/0x150 [ 2297.310679][ T6267] ? __fget+0x37c/0x3c0 [ 2297.314806][ T6267] ? fget_many+0x20/0x20 [ 2297.319058][ T6267] ? __fpregs_load_activate+0x2d3/0x390 [ 2297.324619][ T6267] ? security_file_ioctl+0xad/0xc0 [ 2297.329706][ T6267] __x64_sys_ioctl+0xd4/0x110 [ 2297.334376][ T6267] do_syscall_64+0xcb/0x150 [ 2297.338848][ T6267] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2297.344720][ T6267] RIP: 0033:0x45dcc7 [ 2297.348582][ T6267] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2297.368194][ T6267] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2297.376589][ T6267] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2297.384530][ T6267] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2297.392474][ T6267] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2297.400453][ T6267] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2297.408395][ T6267] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2297.430040][ T6257] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2297.441908][ T6257] EXT4-fs (loop3): get root inode failed [ 2297.447791][ T6257] EXT4-fs (loop3): mount failed 18:55:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0244040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0245040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:17 executing program 4 (fault-call:0 fault-nth:23): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0246040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2297.483552][ T6267] EXT4-fs mount: 6 callbacks suppressed [ 2297.483563][ T6267] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2297.573070][ T6275] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:17 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000009000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x8000000) 18:55:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0247040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xd000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0248040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2297.613814][ T6288] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2297.633378][ T6288] EXT4-fs (loop3): get root inode failed [ 2297.639200][ T6288] EXT4-fs (loop3): mount failed 18:55:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0249040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2297.673640][ T6296] FAULT_INJECTION: forcing a failure. [ 2297.673640][ T6296] name failslab, interval 1, probability 0, space 0, times 0 [ 2297.686746][ T6296] CPU: 1 PID: 6296 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2297.696796][ T6296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2297.706854][ T6296] Call Trace: [ 2297.710117][ T6296] dump_stack+0x1b0/0x21e [ 2297.714416][ T6296] ? devkmsg_release+0x11c/0x11c [ 2297.719323][ T6296] ? show_regs_print_info+0x12/0x12 [ 2297.724503][ T6296] should_fail+0x6fb/0x860 [ 2297.728900][ T6296] ? setup_fault_attr+0x2b0/0x2b0 [ 2297.733922][ T6296] ? should_fail+0x182/0x860 [ 2297.738480][ T6296] ? __kernfs_create_file+0x1f1/0x260 [ 2297.743820][ T6296] ? kzalloc+0x22/0x40 [ 2297.747855][ T6296] should_failslab+0x5/0x20 [ 2297.752328][ T6296] __kmalloc+0x5f/0x2c0 [ 2297.756477][ T6296] ? sysfs_add_file_mode_ns+0x2b4/0x340 [ 2297.761991][ T6296] kzalloc+0x22/0x40 [ 2297.765855][ T6296] kobject_get_path+0xb3/0x190 [ 2297.770595][ T6296] kobject_uevent_env+0x28c/0x1100 [ 2297.775675][ T6296] ? _raw_spin_unlock+0x5/0x20 [ 2297.780411][ T6296] ? ___preempt_schedule+0x16/0x20 [ 2297.785512][ T6296] loop_configure+0xea1/0x1380 [ 2297.790250][ T6296] lo_ioctl+0x781/0x22e0 [ 2297.794475][ T6296] ? lo_release+0x1e0/0x1e0 [ 2297.798964][ T6296] ? update_blocked_averages+0xea0/0xea0 [ 2297.804566][ T6296] ? arch_stack_walk+0x98/0xe0 [ 2297.809303][ T6296] ? _raw_spin_lock+0xa1/0x170 [ 2297.814056][ T6296] ? _raw_spin_trylock_bh+0x190/0x190 [ 2297.819406][ T6296] ? __rcu_read_lock+0x50/0x50 [ 2297.824137][ T6296] ? __rcu_read_lock+0x50/0x50 [ 2297.828868][ T6296] ? update_load_avg+0x410/0x8f0 [ 2297.833802][ T6296] ? enqueue_entity+0x74f/0xd80 [ 2297.838652][ T6296] ? check_preempt_wakeup+0x6fc/0xd60 [ 2297.843994][ T6296] ? ttwu_do_wakeup+0x154/0x5b0 [ 2297.848834][ T6296] ? _raw_spin_unlock+0x5/0x20 [ 2297.853572][ T6296] ? ttwu_queue+0x243/0x380 [ 2297.858055][ T6296] ? psi_ttwu_dequeue+0x320/0x320 [ 2297.863064][ T6296] ? try_to_wake_up+0xbe8/0xd80 [ 2297.867896][ T6296] ? cpus_share_cache+0xd0/0xd0 [ 2297.872733][ T6296] ? _raw_spin_lock+0xa1/0x170 [ 2297.877467][ T6296] ? _raw_spin_trylock_bh+0x190/0x190 [ 2297.882814][ T6296] ? memset+0x1f/0x40 [ 2297.886768][ T6296] ? unwind_next_frame+0x1c07/0x22b0 [ 2297.892022][ T6296] ? arch_stack_walk+0x78/0xe0 [ 2297.896785][ T6296] ? unwind_get_return_address_ptr+0x130/0x130 [ 2297.902926][ T6296] ? memset+0x1f/0x40 [ 2297.906888][ T6296] ? unwind_next_frame+0x1c07/0x22b0 [ 2297.912149][ T6296] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2297.918195][ T6296] ? lo_release+0x1e0/0x1e0 [ 2297.922670][ T6296] blkdev_ioctl+0x89a/0x2c30 [ 2297.927229][ T6296] ? 0xffffffffa0128000 [ 2297.931353][ T6296] ? is_bpf_text_address+0x290/0x2b0 [ 2297.936625][ T6296] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2297.941896][ T6296] ? stack_trace_save+0x1e0/0x1e0 [ 2297.946896][ T6296] ? __kernel_text_address+0x93/0x110 [ 2297.952244][ T6296] ? unwind_get_return_address+0x48/0x90 [ 2297.957844][ T6296] ? arch_stack_walk+0x98/0xe0 [ 2297.962577][ T6296] ? __rcu_read_lock+0x50/0x50 [ 2297.967329][ T6296] ? avc_has_extended_perms+0x69e/0x10c0 [ 2297.972944][ T6296] ? avc_has_extended_perms+0xb25/0x10c0 [ 2297.978557][ T6296] ? avc_ss_reset+0x3a0/0x3a0 [ 2297.983208][ T6296] ? kmem_cache_free+0xac/0x5c0 [ 2297.988025][ T6296] ? __kasan_slab_free+0x1e2/0x220 [ 2297.993104][ T6296] ? __kasan_slab_free+0x168/0x220 [ 2297.998196][ T6296] ? slab_free_freelist_hook+0xd0/0x150 [ 2298.003725][ T6296] ? kmem_cache_free+0xac/0x5c0 [ 2298.008568][ T6296] ? do_sys_open+0x4a3/0x620 [ 2298.013124][ T6296] ? do_syscall_64+0xcb/0x150 [ 2298.017768][ T6296] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2298.023801][ T6296] ? __kasan_kmalloc+0x117/0x1b0 [ 2298.028722][ T6296] ? kmem_cache_alloc+0x1d5/0x250 [ 2298.033714][ T6296] ? getname_flags+0xb8/0x610 [ 2298.038373][ T6296] ? do_sys_open+0x2fc/0x620 [ 2298.042931][ T6296] ? do_syscall_64+0xcb/0x150 [ 2298.047581][ T6296] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2298.053628][ T6296] ? generic_file_write_iter+0x4f6/0x650 [ 2298.059230][ T6296] block_ioctl+0xb6/0xf0 [ 2298.063441][ T6296] ? blkdev_iopoll+0xf0/0xf0 [ 2298.068000][ T6296] do_vfs_ioctl+0x746/0x16f0 [ 2298.072589][ T6296] ? selinux_file_ioctl+0x6e4/0x920 [ 2298.077754][ T6296] ? ioctl_preallocate+0x240/0x240 [ 2298.082834][ T6296] ? slab_free_freelist_hook+0xd0/0x150 [ 2298.088347][ T6296] ? __fget+0x37c/0x3c0 [ 2298.092488][ T6296] ? fget_many+0x20/0x20 [ 2298.096701][ T6296] ? __fpregs_load_activate+0x2d3/0x390 [ 2298.102224][ T6296] ? security_file_ioctl+0xad/0xc0 [ 2298.107308][ T6296] __x64_sys_ioctl+0xd4/0x110 [ 2298.111962][ T6296] do_syscall_64+0xcb/0x150 [ 2298.116435][ T6296] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2298.122299][ T6296] RIP: 0033:0x45dcc7 [ 2298.126162][ T6296] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2298.145738][ T6296] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2298.154122][ T6296] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2298.162075][ T6296] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 18:55:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e024a040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2298.170021][ T6296] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2298.177971][ T6296] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2298.185915][ T6296] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2298.266217][ T6296] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2298.289943][ T6315] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2298.323085][ T6288] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2298.345613][ T6288] EXT4-fs (loop3): get root inode failed [ 2298.351980][ T6288] EXT4-fs (loop3): mount failed 18:55:17 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000000a000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:17 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e024b040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xe000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:17 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x9000000) 18:55:17 executing program 4 (fault-call:0 fault-nth:24): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:18 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e024c040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:18 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200050000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:18 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200060000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:18 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200070000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:18 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200090000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:18 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000a0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:18 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000000b000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2298.634294][ T6349] FAULT_INJECTION: forcing a failure. [ 2298.634294][ T6349] name failslab, interval 1, probability 0, space 0, times 0 [ 2298.647104][ T6349] CPU: 1 PID: 6349 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2298.657149][ T6349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2298.667191][ T6349] Call Trace: [ 2298.670457][ T6349] dump_stack+0x1b0/0x21e [ 2298.674776][ T6349] ? devkmsg_release+0x11c/0x11c [ 2298.679683][ T6349] ? show_regs_print_info+0x12/0x12 [ 2298.684851][ T6349] ? vsnprintf+0x1ba3/0x1c50 [ 2298.689427][ T6349] should_fail+0x6fb/0x860 [ 2298.693814][ T6349] ? setup_fault_attr+0x2b0/0x2b0 [ 2298.698808][ T6349] ? of_device_uevent+0xeb/0x2b0 [ 2298.703716][ T6349] ? __alloc_skb+0x88/0x4d0 [ 2298.708191][ T6349] should_failslab+0x5/0x20 [ 2298.712674][ T6349] kmem_cache_alloc+0x36/0x250 [ 2298.717430][ T6349] __alloc_skb+0x88/0x4d0 [ 2298.721731][ T6349] alloc_uevent_skb+0x73/0x220 [ 2298.726465][ T6349] kobject_uevent_env+0xb84/0x1100 [ 2298.731548][ T6349] loop_configure+0xea1/0x1380 [ 2298.736285][ T6349] lo_ioctl+0x781/0x22e0 [ 2298.740498][ T6349] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2298.746533][ T6349] ? lo_release+0x1e0/0x1e0 [ 2298.751008][ T6349] ? unwind_get_return_address_ptr+0x130/0x130 [ 2298.757170][ T6349] ? 0xffffffffa0128000 [ 2298.761318][ T6349] ? is_bpf_text_address+0x290/0x2b0 [ 2298.766583][ T6349] ? stack_trace_save+0x1e0/0x1e0 [ 2298.771582][ T6349] ? __kernel_text_address+0x93/0x110 [ 2298.776932][ T6349] ? unwind_get_return_address+0x48/0x90 [ 2298.782537][ T6349] ? arch_stack_walk+0x98/0xe0 [ 2298.787271][ T6349] ? stack_trace_save+0x111/0x1e0 [ 2298.792264][ T6349] ? stack_trace_snprint+0x150/0x150 [ 2298.797521][ T6349] ? arch_stack_walk+0x78/0xe0 [ 2298.802251][ T6349] ? __kasan_kmalloc+0x179/0x1b0 [ 2298.807176][ T6349] ? __rcu_read_lock+0x50/0x50 [ 2298.811920][ T6349] ? __kasan_kmalloc+0x117/0x1b0 [ 2298.816825][ T6349] ? kmem_cache_alloc+0x1d5/0x250 [ 2298.821818][ T6349] ? __perf_event_task_sched_out+0x1127/0x1250 [ 2298.827942][ T6349] ? __perf_event_task_sched_in+0x4ed/0x550 [ 2298.833821][ T6349] ? perf_pmu_sched_task+0x370/0x370 [ 2298.839078][ T6349] ? nohz_balance_enter_idle+0x330/0x330 [ 2298.844708][ T6349] ? __rcu_read_lock+0x50/0x50 [ 2298.849442][ T6349] ? find_next_bit+0xd8/0x120 [ 2298.854086][ T6349] ? _raw_spin_unlock_irq+0x5/0x20 [ 2298.859204][ T6349] ? finish_task_switch+0x235/0x4c0 [ 2298.864374][ T6349] ? __schedule+0x8ae/0xe30 [ 2298.868845][ T6349] ? _raw_spin_lock_irqsave+0xda/0x1c0 [ 2298.874273][ T6349] ? _raw_spin_lock+0x170/0x170 [ 2298.879105][ T6349] ? _raw_spin_lock+0xa1/0x170 [ 2298.883836][ T6349] ? _raw_spin_trylock_bh+0x190/0x190 [ 2298.889203][ T6349] ? try_to_wake_up+0xbd2/0xd80 [ 2298.894059][ T6349] ? cpus_share_cache+0xd0/0xd0 [ 2298.898892][ T6349] ? _raw_spin_lock+0xa1/0x170 [ 2298.903661][ T6349] ? _raw_spin_trylock_bh+0x190/0x190 [ 2298.909000][ T6349] ? avc_denied+0x1c0/0x1c0 [ 2298.913476][ T6349] ? memset+0x1f/0x40 [ 2298.917427][ T6349] ? unwind_next_frame+0x1c07/0x22b0 [ 2298.922682][ T6349] ? arch_stack_walk+0x78/0xe0 [ 2298.927426][ T6349] ? unwind_get_return_address_ptr+0x130/0x130 [ 2298.933571][ T6349] ? memset+0x1f/0x40 [ 2298.937530][ T6349] ? unwind_next_frame+0x1c07/0x22b0 [ 2298.942785][ T6349] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2298.948820][ T6349] ? lo_release+0x1e0/0x1e0 [ 2298.953292][ T6349] blkdev_ioctl+0x89a/0x2c30 [ 2298.957851][ T6349] ? 0xffffffffa0128000 [ 2298.961974][ T6349] ? is_bpf_text_address+0x290/0x2b0 [ 2298.967226][ T6349] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2298.972477][ T6349] ? stack_trace_save+0x1e0/0x1e0 [ 2298.977484][ T6349] ? __kernel_text_address+0x93/0x110 [ 2298.982824][ T6349] ? unwind_get_return_address+0x48/0x90 [ 2298.988422][ T6349] ? arch_stack_walk+0x98/0xe0 [ 2298.993154][ T6349] ? __rcu_read_lock+0x50/0x50 [ 2298.997900][ T6349] ? avc_has_extended_perms+0x69e/0x10c0 [ 2299.003511][ T6349] ? avc_has_extended_perms+0xb25/0x10c0 [ 2299.009109][ T6349] ? avc_ss_reset+0x3a0/0x3a0 [ 2299.013754][ T6349] ? kmem_cache_free+0xac/0x5c0 [ 2299.018577][ T6349] ? __kasan_slab_free+0x1e2/0x220 [ 2299.023686][ T6349] ? __kasan_slab_free+0x168/0x220 [ 2299.028765][ T6349] ? slab_free_freelist_hook+0xd0/0x150 [ 2299.034276][ T6349] ? kmem_cache_free+0xac/0x5c0 [ 2299.039092][ T6349] ? do_sys_open+0x4a3/0x620 [ 2299.043648][ T6349] ? do_syscall_64+0xcb/0x150 [ 2299.048295][ T6349] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2299.054340][ T6349] ? __kasan_kmalloc+0x117/0x1b0 [ 2299.059251][ T6349] ? kmem_cache_alloc+0x1d5/0x250 [ 2299.064252][ T6349] ? getname_flags+0xb8/0x610 [ 2299.068907][ T6349] ? do_sys_open+0x2fc/0x620 [ 2299.073470][ T6349] ? do_syscall_64+0xcb/0x150 [ 2299.078143][ T6349] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2299.084186][ T6349] ? generic_file_write_iter+0x4f6/0x650 [ 2299.089790][ T6349] block_ioctl+0xb6/0xf0 [ 2299.094018][ T6349] ? blkdev_iopoll+0xf0/0xf0 [ 2299.098578][ T6349] do_vfs_ioctl+0x746/0x16f0 [ 2299.103140][ T6349] ? selinux_file_ioctl+0x6e4/0x920 [ 2299.108310][ T6349] ? ioctl_preallocate+0x240/0x240 [ 2299.113407][ T6349] ? slab_free_freelist_hook+0xd0/0x150 [ 2299.118925][ T6349] ? __fget+0x37c/0x3c0 [ 2299.123055][ T6349] ? fget_many+0x20/0x20 [ 2299.127268][ T6349] ? __fpregs_load_activate+0x2d3/0x390 [ 2299.132784][ T6349] ? security_file_ioctl+0xad/0xc0 [ 2299.137969][ T6349] __x64_sys_ioctl+0xd4/0x110 [ 2299.142617][ T6349] do_syscall_64+0xcb/0x150 [ 2299.147088][ T6349] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2299.152953][ T6349] RIP: 0033:0x45dcc7 [ 2299.156834][ T6349] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2299.176410][ T6349] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2299.184795][ T6349] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2299.192747][ T6349] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2299.200702][ T6349] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2299.208648][ T6349] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2299.216694][ T6349] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2299.293292][ T6345] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2299.312086][ T6349] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2299.317297][ T6345] EXT4-fs (loop3): get root inode failed [ 2299.339542][ T6345] EXT4-fs (loop3): mount failed 18:55:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xa, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:19 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000b0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x10000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xa000000) 18:55:19 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000000c000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:19 executing program 4 (fault-call:0 fault-nth:25): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2299.449864][ T6345] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2299.462755][ T6345] EXT4-fs (loop3): get root inode failed [ 2299.468388][ T6345] EXT4-fs (loop3): mount failed 18:55:19 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02040b0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:19 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000c0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:19 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000d0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:19 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000000d000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:19 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000e0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2299.577203][ T6364] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2299.588349][ T6370] FAULT_INJECTION: forcing a failure. [ 2299.588349][ T6370] name failslab, interval 1, probability 0, space 0, times 0 [ 2299.601257][ T6370] CPU: 1 PID: 6370 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2299.611323][ T6370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2299.621399][ T6370] Call Trace: [ 2299.624686][ T6370] dump_stack+0x1b0/0x21e [ 2299.628989][ T6370] ? devkmsg_release+0x11c/0x11c [ 2299.633908][ T6370] ? show_regs_print_info+0x12/0x12 [ 2299.639080][ T6370] ? vsnprintf+0x1ba3/0x1c50 [ 2299.643652][ T6370] should_fail+0x6fb/0x860 [ 2299.648061][ T6370] ? setup_fault_attr+0x2b0/0x2b0 [ 2299.653069][ T6370] ? ___slab_alloc+0x9b/0x450 [ 2299.657734][ T6370] ? alloc_uevent_skb+0x73/0x220 [ 2299.662640][ T6370] should_failslab+0x5/0x20 [ 2299.667115][ T6370] __kmalloc_track_caller+0x5d/0x2b0 [ 2299.672369][ T6370] ? kmem_cache_alloc+0x1d5/0x250 [ 2299.677377][ T6370] ? alloc_uevent_skb+0x73/0x220 [ 2299.682284][ T6370] __alloc_skb+0xd1/0x4d0 [ 2299.686582][ T6370] alloc_uevent_skb+0x73/0x220 [ 2299.691315][ T6370] kobject_uevent_env+0xb84/0x1100 [ 2299.696405][ T6370] loop_configure+0xea1/0x1380 [ 2299.701149][ T6370] lo_ioctl+0x781/0x22e0 [ 2299.705375][ T6370] ? lo_release+0x1e0/0x1e0 [ 2299.709865][ T6370] ? update_blocked_averages+0xea0/0xea0 [ 2299.715465][ T6370] ? arch_stack_walk+0x98/0xe0 [ 2299.720199][ T6370] ? _raw_spin_lock+0xa1/0x170 [ 2299.724930][ T6370] ? _raw_spin_trylock_bh+0x190/0x190 [ 2299.730289][ T6370] ? __rcu_read_lock+0x50/0x50 [ 2299.735022][ T6370] ? update_load_avg+0x410/0x8f0 [ 2299.739929][ T6370] ? enqueue_entity+0x74f/0xd80 [ 2299.744749][ T6370] ? check_preempt_wakeup+0x6fc/0xd60 [ 2299.750089][ T6370] ? ttwu_do_wakeup+0x154/0x5b0 [ 2299.754907][ T6370] ? _raw_spin_unlock+0x5/0x20 [ 2299.759640][ T6370] ? ttwu_queue+0x243/0x380 [ 2299.764112][ T6370] ? psi_ttwu_dequeue+0x320/0x320 [ 2299.769104][ T6370] ? schedule+0x13b/0x1d0 [ 2299.773405][ T6370] ? try_to_wake_up+0xbe8/0xd80 [ 2299.778242][ T6370] ? cpus_share_cache+0xd0/0xd0 [ 2299.783075][ T6370] ? _raw_spin_lock+0xa1/0x170 [ 2299.787806][ T6370] ? _raw_spin_trylock_bh+0x190/0x190 [ 2299.793148][ T6370] ? avc_denied+0x1c0/0x1c0 [ 2299.797625][ T6370] ? memset+0x1f/0x40 [ 2299.801587][ T6370] ? unwind_next_frame+0x1c07/0x22b0 [ 2299.806852][ T6370] ? arch_stack_walk+0x78/0xe0 [ 2299.811603][ T6370] ? unwind_get_return_address_ptr+0x130/0x130 [ 2299.817744][ T6370] ? memset+0x1f/0x40 [ 2299.821695][ T6370] ? unwind_next_frame+0x1c07/0x22b0 [ 2299.826950][ T6370] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2299.832984][ T6370] ? lo_release+0x1e0/0x1e0 [ 2299.837506][ T6370] blkdev_ioctl+0x89a/0x2c30 [ 2299.842063][ T6370] ? 0xffffffffa0128000 [ 2299.846186][ T6370] ? is_bpf_text_address+0x290/0x2b0 [ 2299.851441][ T6370] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2299.856694][ T6370] ? stack_trace_save+0x1e0/0x1e0 [ 2299.861686][ T6370] ? __kernel_text_address+0x93/0x110 [ 2299.867030][ T6370] ? unwind_get_return_address+0x48/0x90 [ 2299.872647][ T6370] ? arch_stack_walk+0x98/0xe0 [ 2299.877393][ T6370] ? __rcu_read_lock+0x50/0x50 [ 2299.882136][ T6370] ? avc_has_extended_perms+0x69e/0x10c0 [ 2299.887736][ T6370] ? avc_has_extended_perms+0xb25/0x10c0 [ 2299.893347][ T6370] ? avc_ss_reset+0x3a0/0x3a0 [ 2299.898000][ T6370] ? kmem_cache_free+0xac/0x5c0 [ 2299.902905][ T6370] ? __kasan_slab_free+0x1e2/0x220 [ 2299.907983][ T6370] ? __kasan_slab_free+0x168/0x220 [ 2299.913072][ T6370] ? slab_free_freelist_hook+0xd0/0x150 [ 2299.918624][ T6370] ? kmem_cache_free+0xac/0x5c0 [ 2299.923458][ T6370] ? do_sys_open+0x4a3/0x620 [ 2299.928015][ T6370] ? do_syscall_64+0xcb/0x150 [ 2299.932658][ T6370] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2299.938691][ T6370] ? __kasan_kmalloc+0x117/0x1b0 [ 2299.943612][ T6370] ? kmem_cache_alloc+0x1d5/0x250 [ 2299.948601][ T6370] ? getname_flags+0xb8/0x610 [ 2299.953244][ T6370] ? do_sys_open+0x2fc/0x620 [ 2299.957799][ T6370] ? do_syscall_64+0xcb/0x150 [ 2299.962452][ T6370] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2299.968497][ T6370] ? generic_file_write_iter+0x4f6/0x650 [ 2299.974098][ T6370] block_ioctl+0xb6/0xf0 [ 2299.978308][ T6370] ? blkdev_iopoll+0xf0/0xf0 [ 2299.982881][ T6370] do_vfs_ioctl+0x746/0x16f0 [ 2299.987453][ T6370] ? selinux_file_ioctl+0x6e4/0x920 [ 2299.992705][ T6370] ? ioctl_preallocate+0x240/0x240 [ 2299.997785][ T6370] ? slab_free_freelist_hook+0xd0/0x150 [ 2300.003298][ T6370] ? __fget+0x37c/0x3c0 [ 2300.007427][ T6370] ? fget_many+0x20/0x20 [ 2300.011649][ T6370] ? __fpregs_load_activate+0x2d3/0x390 [ 2300.017181][ T6370] ? security_file_ioctl+0xad/0xc0 [ 2300.022262][ T6370] __x64_sys_ioctl+0xd4/0x110 [ 2300.026908][ T6370] do_syscall_64+0xcb/0x150 [ 2300.031392][ T6370] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2300.037259][ T6370] RIP: 0033:0x45dcc7 [ 2300.041120][ T6370] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2300.060720][ T6370] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2300.069098][ T6370] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 18:55:19 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0220100000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2300.077080][ T6370] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2300.085018][ T6370] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2300.092970][ T6370] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2300.100925][ T6370] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2300.181627][ T6370] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2300.225859][ T6384] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2300.239314][ T6384] EXT4-fs (loop3): get root inode failed [ 2300.245720][ T6384] EXT4-fs (loop3): mount failed [ 2300.346562][ T6384] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2300.358273][ T6384] EXT4-fs (loop3): get root inode failed [ 2300.364664][ T6384] EXT4-fs (loop3): mount failed 18:55:19 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xb, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:19 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200110000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:19 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xb000000) 18:55:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x11000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:19 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000000e000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:19 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200120000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200180000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02001f0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2300.444433][ T6407] FAULT_INJECTION: forcing a failure. [ 2300.444433][ T6407] name failslab, interval 1, probability 0, space 0, times 0 [ 2300.457529][ T6407] CPU: 0 PID: 6407 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2300.467583][ T6407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2300.477633][ T6407] Call Trace: [ 2300.480917][ T6407] dump_stack+0x1b0/0x21e [ 2300.485250][ T6407] ? devkmsg_release+0x11c/0x11c 18:55:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200200000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0210200000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2300.490168][ T6407] ? show_regs_print_info+0x12/0x12 [ 2300.495356][ T6407] ? vsnprintf+0x1ba3/0x1c50 [ 2300.499944][ T6407] should_fail+0x6fb/0x860 [ 2300.504387][ T6407] ? setup_fault_attr+0x2b0/0x2b0 [ 2300.509394][ T6407] ? of_device_uevent+0xeb/0x2b0 [ 2300.514362][ T6407] ? __alloc_skb+0x88/0x4d0 [ 2300.518843][ T6407] should_failslab+0x5/0x20 [ 2300.523331][ T6407] kmem_cache_alloc+0x36/0x250 [ 2300.528075][ T6407] __alloc_skb+0x88/0x4d0 [ 2300.532404][ T6407] alloc_uevent_skb+0x73/0x220 [ 2300.537165][ T6407] kobject_uevent_env+0xb84/0x1100 18:55:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200220000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2300.542275][ T6407] loop_configure+0xea1/0x1380 [ 2300.547027][ T6407] lo_ioctl+0x781/0x22e0 [ 2300.551250][ T6407] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2300.557299][ T6407] ? lo_release+0x1e0/0x1e0 [ 2300.561831][ T6407] ? unwind_get_return_address_ptr+0x130/0x130 [ 2300.567992][ T6407] ? 0xffffffffa0128000 [ 2300.572138][ T6407] ? is_bpf_text_address+0x290/0x2b0 [ 2300.577406][ T6407] ? stack_trace_save+0x1e0/0x1e0 [ 2300.582410][ T6407] ? __kernel_text_address+0x93/0x110 [ 2300.587771][ T6407] ? unwind_get_return_address+0x48/0x90 [ 2300.593383][ T6407] ? arch_stack_walk+0x98/0xe0 [ 2300.598120][ T6407] ? stack_trace_save+0x111/0x1e0 [ 2300.603115][ T6407] ? stack_trace_snprint+0x150/0x150 [ 2300.608380][ T6407] ? arch_stack_walk+0x78/0xe0 [ 2300.613137][ T6407] ? __kasan_kmalloc+0x179/0x1b0 [ 2300.618075][ T6407] ? __kasan_kmalloc+0x117/0x1b0 [ 2300.622984][ T6407] ? kmem_cache_alloc+0x1d5/0x250 [ 2300.627977][ T6407] ? xas_create+0x4f9/0x1360 [ 2300.632535][ T6407] ? xas_create_range+0x137/0x630 [ 2300.637528][ T6407] ? shmem_add_to_page_cache+0x642/0xc10 [ 2300.643130][ T6407] ? shmem_getpage_gfp+0x14b6/0x2410 [ 2300.648386][ T6407] ? memset+0x1f/0x40 [ 2300.652378][ T6407] ? unwind_next_frame+0x1c07/0x22b0 [ 2300.657660][ T6407] ? arch_stack_walk+0x78/0xe0 [ 2300.662405][ T6407] ? unwind_get_return_address_ptr+0x130/0x130 [ 2300.668573][ T6407] ? memset+0x1f/0x40 [ 2300.672528][ T6407] ? unwind_next_frame+0x1c07/0x22b0 [ 2300.677790][ T6407] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2300.683828][ T6407] ? __rcu_read_lock+0x50/0x50 [ 2300.688562][ T6407] ? unwind_get_return_address_ptr+0x130/0x130 [ 2300.694683][ T6407] ? 0xffffffffa0128000 [ 2300.698808][ T6407] ? is_bpf_text_address+0x290/0x2b0 [ 2300.704071][ T6407] ? stack_trace_save+0x1e0/0x1e0 [ 2300.709116][ T6407] ? __kernel_text_address+0x93/0x110 [ 2300.714474][ T6407] ? __rcu_read_lock+0x50/0x50 [ 2300.719207][ T6407] ? unwind_get_return_address+0x48/0x90 [ 2300.724819][ T6407] ? kobject_get_unless_zero+0x1c8/0x2a0 [ 2300.730427][ T6407] ? kobject_del+0x210/0x210 [ 2300.734987][ T6407] ? mutex_lock+0xa6/0x110 [ 2300.739384][ T6407] ? __module_put_and_exit+0x20/0x20 [ 2300.744656][ T6407] ? avc_denied+0x1c0/0x1c0 [ 2300.749132][ T6407] ? memset+0x1f/0x40 [ 2300.753084][ T6407] ? unwind_next_frame+0x1c07/0x22b0 [ 2300.758340][ T6407] ? arch_stack_walk+0x78/0xe0 [ 2300.763075][ T6407] ? unwind_get_return_address_ptr+0x130/0x130 [ 2300.769201][ T6407] ? memset+0x1f/0x40 [ 2300.773152][ T6407] ? unwind_next_frame+0x1c07/0x22b0 [ 2300.778428][ T6407] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2300.784471][ T6407] ? lo_release+0x1e0/0x1e0 [ 2300.788953][ T6407] blkdev_ioctl+0x89a/0x2c30 [ 2300.793515][ T6407] ? 0xffffffffa0128000 [ 2300.797647][ T6407] ? is_bpf_text_address+0x290/0x2b0 [ 2300.802913][ T6407] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2300.808165][ T6407] ? stack_trace_save+0x1e0/0x1e0 [ 2300.813165][ T6407] ? __kernel_text_address+0x93/0x110 [ 2300.818517][ T6407] ? unwind_get_return_address+0x48/0x90 [ 2300.824162][ T6407] ? arch_stack_walk+0x98/0xe0 [ 2300.828895][ T6407] ? __rcu_read_lock+0x50/0x50 [ 2300.833629][ T6407] ? avc_has_extended_perms+0x69e/0x10c0 [ 2300.839227][ T6407] ? avc_has_extended_perms+0xb25/0x10c0 [ 2300.844838][ T6407] ? avc_ss_reset+0x3a0/0x3a0 [ 2300.849510][ T6407] ? kmem_cache_free+0xac/0x5c0 [ 2300.854328][ T6407] ? __kasan_slab_free+0x1e2/0x220 [ 2300.860795][ T6407] ? __kasan_slab_free+0x168/0x220 [ 2300.865877][ T6407] ? slab_free_freelist_hook+0xd0/0x150 [ 2300.871414][ T6407] ? kmem_cache_free+0xac/0x5c0 [ 2300.876232][ T6407] ? do_sys_open+0x4a3/0x620 [ 2300.880789][ T6407] ? do_syscall_64+0xcb/0x150 [ 2300.885434][ T6407] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2300.891466][ T6407] ? __kasan_kmalloc+0x117/0x1b0 [ 2300.896370][ T6407] ? kmem_cache_alloc+0x1d5/0x250 [ 2300.901378][ T6407] ? getname_flags+0xb8/0x610 [ 2300.906115][ T6407] ? do_sys_open+0x2fc/0x620 [ 2300.910670][ T6407] ? do_syscall_64+0xcb/0x150 [ 2300.915321][ T6407] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2300.921365][ T6407] ? generic_file_write_iter+0x4f6/0x650 [ 2300.927004][ T6407] block_ioctl+0xb6/0xf0 [ 2300.931219][ T6407] ? blkdev_iopoll+0xf0/0xf0 [ 2300.935778][ T6407] do_vfs_ioctl+0x746/0x16f0 [ 2300.940354][ T6407] ? selinux_file_ioctl+0x6e4/0x920 [ 2300.945522][ T6407] ? ioctl_preallocate+0x240/0x240 [ 2300.950603][ T6407] ? slab_free_freelist_hook+0xd0/0x150 [ 2300.956115][ T6407] ? __fget+0x37c/0x3c0 [ 2300.960261][ T6407] ? fget_many+0x20/0x20 [ 2300.964480][ T6407] ? do_sys_open+0x4a3/0x620 [ 2300.969049][ T6407] ? file_open_root+0x440/0x440 [ 2300.973894][ T6407] ? security_file_ioctl+0xad/0xc0 [ 2300.978981][ T6407] __x64_sys_ioctl+0xd4/0x110 [ 2300.983634][ T6407] do_syscall_64+0xcb/0x150 [ 2300.988106][ T6407] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2300.993966][ T6407] RIP: 0033:0x45dcc7 [ 2300.997830][ T6407] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2301.017418][ T6407] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2301.025805][ T6407] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2301.033820][ T6407] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2301.041770][ T6407] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2301.049708][ T6407] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2301.057665][ T6407] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2301.202812][ T6407] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2301.214956][ T6412] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2301.231595][ T6408] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2301.247561][ T6412] EXT4-fs (loop3): get root inode failed [ 2301.254053][ T6412] EXT4-fs (loop3): mount failed 18:55:20 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xc, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200250000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:20 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000000f000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x12000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:20 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xc000000) 18:55:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0227250000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0225270000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02003f0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2301.419179][ T6452] FAULT_INJECTION: forcing a failure. [ 2301.419179][ T6452] name failslab, interval 1, probability 0, space 0, times 0 [ 2301.432536][ T6452] CPU: 0 PID: 6452 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2301.442669][ T6452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2301.452708][ T6452] Call Trace: [ 2301.455980][ T6452] dump_stack+0x1b0/0x21e [ 2301.460290][ T6452] ? devkmsg_release+0x11c/0x11c 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200400000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204400000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2301.465220][ T6452] ? show_regs_print_info+0x12/0x12 [ 2301.470400][ T6452] ? vsnprintf+0x1c50/0x1c50 [ 2301.474970][ T6452] should_fail+0x6fb/0x860 [ 2301.479371][ T6452] ? setup_fault_attr+0x2b0/0x2b0 [ 2301.484377][ T6452] ? vsnprintf+0x1ba3/0x1c50 [ 2301.488958][ T6452] ? skb_clone+0x1b2/0x370 [ 2301.493361][ T6452] should_failslab+0x5/0x20 [ 2301.497844][ T6452] kmem_cache_alloc+0x36/0x250 [ 2301.502579][ T6452] ? ptr_to_hashval+0x60/0x60 [ 2301.507235][ T6452] skb_clone+0x1b2/0x370 [ 2301.511505][ T6452] netlink_broadcast_filtered+0x5d5/0x10c0 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204410000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2301.517316][ T6452] netlink_broadcast+0x35/0x50 [ 2301.522059][ T6452] kobject_uevent_env+0xbb7/0x1100 [ 2301.527236][ T6452] ? ___preempt_schedule+0x16/0x20 [ 2301.532341][ T6452] loop_configure+0xea1/0x1380 [ 2301.537104][ T6452] lo_ioctl+0x781/0x22e0 [ 2301.541369][ T6452] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2301.547420][ T6452] ? lo_release+0x1e0/0x1e0 [ 2301.551904][ T6452] ? unwind_get_return_address_ptr+0x130/0x130 [ 2301.558035][ T6452] ? 0xffffffffa0128000 [ 2301.562196][ T6452] ? is_bpf_text_address+0x290/0x2b0 [ 2301.567468][ T6452] ? stack_trace_save+0x1e0/0x1e0 [ 2301.572485][ T6452] ? __kernel_text_address+0x93/0x110 [ 2301.577840][ T6452] ? unwind_get_return_address+0x48/0x90 [ 2301.583451][ T6452] ? arch_stack_walk+0x98/0xe0 [ 2301.588209][ T6452] ? stack_trace_save+0x111/0x1e0 [ 2301.593216][ T6452] ? stack_trace_snprint+0x150/0x150 [ 2301.598487][ T6452] ? arch_stack_walk+0x78/0xe0 [ 2301.603224][ T6452] ? __kasan_kmalloc+0x179/0x1b0 [ 2301.608152][ T6452] ? __perf_event_task_sched_out+0x1127/0x1250 [ 2301.614273][ T6452] ? __perf_event_task_sched_in+0x4ed/0x550 [ 2301.620159][ T6452] ? perf_pmu_sched_task+0x370/0x370 [ 2301.625413][ T6452] ? _raw_spin_unlock_irq+0x5/0x20 [ 2301.630493][ T6452] ? finish_task_switch+0x235/0x4c0 [ 2301.635661][ T6452] ? __schedule+0x8ae/0xe30 [ 2301.640158][ T6452] ? _raw_spin_lock+0xa1/0x170 [ 2301.644907][ T6452] ? _raw_spin_trylock_bh+0x190/0x190 [ 2301.650272][ T6452] ? schedule+0x13b/0x1d0 [ 2301.654569][ T6452] ? _raw_spin_unlock+0x5/0x20 [ 2301.659302][ T6452] ? __mutex_lock+0xabf/0xc40 [ 2301.663948][ T6452] ? __ww_mutex_lock_interruptible_slowpath+0x10/0x10 [ 2301.670676][ T6452] ? mutex_lock+0xa6/0x110 [ 2301.675062][ T6452] ? __module_put_and_exit+0x20/0x20 [ 2301.680335][ T6452] ? avc_denied+0x1c0/0x1c0 [ 2301.684810][ T6452] ? memset+0x1f/0x40 [ 2301.688782][ T6452] ? unwind_next_frame+0x1c07/0x22b0 [ 2301.694036][ T6452] ? arch_stack_walk+0x78/0xe0 [ 2301.698768][ T6452] ? unwind_get_return_address_ptr+0x130/0x130 [ 2301.704917][ T6452] ? memset+0x1f/0x40 [ 2301.708899][ T6452] ? unwind_next_frame+0x1c07/0x22b0 [ 2301.714171][ T6452] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2301.720227][ T6452] ? lo_release+0x1e0/0x1e0 [ 2301.724700][ T6452] blkdev_ioctl+0x89a/0x2c30 [ 2301.729260][ T6452] ? 0xffffffffa0128000 [ 2301.733408][ T6452] ? is_bpf_text_address+0x290/0x2b0 [ 2301.738664][ T6452] ? __blkdev_driver_ioctl+0xd0/0xd0 [ 2301.743942][ T6452] ? stack_trace_save+0x1e0/0x1e0 [ 2301.748964][ T6452] ? __kernel_text_address+0x93/0x110 [ 2301.754313][ T6452] ? unwind_get_return_address+0x48/0x90 [ 2301.759913][ T6452] ? arch_stack_walk+0x98/0xe0 [ 2301.764666][ T6452] ? __rcu_read_lock+0x50/0x50 [ 2301.769418][ T6452] ? avc_has_extended_perms+0x69e/0x10c0 [ 2301.775034][ T6452] ? avc_has_extended_perms+0xb25/0x10c0 [ 2301.780634][ T6452] ? avc_ss_reset+0x3a0/0x3a0 [ 2301.785303][ T6452] ? kmem_cache_free+0xac/0x5c0 [ 2301.790129][ T6452] ? __kasan_slab_free+0x1e2/0x220 [ 2301.795238][ T6452] ? __kasan_slab_free+0x168/0x220 [ 2301.800317][ T6452] ? slab_free_freelist_hook+0xd0/0x150 [ 2301.805831][ T6452] ? kmem_cache_free+0xac/0x5c0 [ 2301.810648][ T6452] ? do_sys_open+0x4a3/0x620 [ 2301.815207][ T6452] ? do_syscall_64+0xcb/0x150 [ 2301.819862][ T6452] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2301.825893][ T6452] ? __kasan_kmalloc+0x117/0x1b0 [ 2301.830795][ T6452] ? kmem_cache_alloc+0x1d5/0x250 [ 2301.835786][ T6452] ? getname_flags+0xb8/0x610 [ 2301.840437][ T6452] ? do_sys_open+0x2fc/0x620 [ 2301.844997][ T6452] ? do_syscall_64+0xcb/0x150 [ 2301.849639][ T6452] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2301.855675][ T6452] ? generic_file_write_iter+0x4f6/0x650 [ 2301.861274][ T6452] block_ioctl+0xb6/0xf0 [ 2301.865483][ T6452] ? blkdev_iopoll+0xf0/0xf0 [ 2301.870039][ T6452] do_vfs_ioctl+0x746/0x16f0 [ 2301.874599][ T6452] ? selinux_file_ioctl+0x6e4/0x920 [ 2301.879784][ T6452] ? ioctl_preallocate+0x240/0x240 [ 2301.884862][ T6452] ? slab_free_freelist_hook+0xd0/0x150 [ 2301.890372][ T6452] ? __fget+0x37c/0x3c0 [ 2301.894494][ T6452] ? fget_many+0x20/0x20 [ 2301.898709][ T6452] ? __fpregs_load_activate+0x2d3/0x390 [ 2301.904247][ T6452] ? security_file_ioctl+0xad/0xc0 [ 2301.909323][ T6452] __x64_sys_ioctl+0xd4/0x110 [ 2301.914017][ T6452] do_syscall_64+0xcb/0x150 [ 2301.918541][ T6452] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2301.924419][ T6452] RIP: 0033:0x45dcc7 [ 2301.928288][ T6452] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 6d b5 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2301.947871][ T6452] RSP: 002b:00007f415c78ba28 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2301.956249][ T6452] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045dcc7 [ 2301.964187][ T6452] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2301.972149][ T6452] RBP: 0000000000000000 R08: 0000000020000290 R09: 0000000000000000 [ 2301.980097][ T6452] R10: 0000000000022100 R11: 0000000000000246 R12: 0000000000000006 [ 2301.988041][ T6452] R13: 0000000000000004 R14: 0000000000000004 R15: 00000000200002a0 [ 2302.015302][ T6447] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2302.056634][ T6452] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2302.065807][ T6448] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2302.077598][ T6448] EXT4-fs (loop3): get root inode failed [ 2302.083362][ T6448] EXT4-fs (loop3): mount failed [ 2302.127419][ T6448] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2302.139087][ T6448] EXT4-fs (loop3): get root inode failed [ 2302.144808][ T6448] EXT4-fs (loop3): mount failed 18:55:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x18000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204420000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000010000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xd, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:21 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xd000000) 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204430000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204440000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204450000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204460000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204470000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x1f000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2302.323082][ T6484] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2302.332956][ T6491] FAULT_INJECTION: forcing a failure. [ 2302.332956][ T6491] name failslab, interval 1, probability 0, space 0, times 0 [ 2302.347772][ T6491] CPU: 1 PID: 6491 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2302.357826][ T6491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2302.367873][ T6491] Call Trace: [ 2302.371160][ T6491] dump_stack+0x1b0/0x21e [ 2302.375574][ T6491] ? devkmsg_release+0x11c/0x11c [ 2302.380492][ T6491] ? show_regs_print_info+0x12/0x12 [ 2302.385669][ T6491] ? terminate_walk+0x382/0x4f0 [ 2302.390500][ T6491] ? filename_parentat+0x2bc/0x840 [ 2302.395593][ T6491] should_fail+0x6fb/0x860 [ 2302.399991][ T6491] ? setup_fault_attr+0x2b0/0x2b0 [ 2302.404995][ T6491] ? kern_path_locked+0x550/0x550 [ 2302.409997][ T6491] ? __rcu_read_lock+0x50/0x50 [ 2302.414739][ T6491] ? __d_alloc+0x2a/0x6b0 [ 2302.419046][ T6491] should_failslab+0x5/0x20 [ 2302.423529][ T6491] kmem_cache_alloc+0x36/0x250 [ 2302.428272][ T6491] __d_alloc+0x2a/0x6b0 [ 2302.432427][ T6491] d_alloc+0x45/0x1c0 [ 2302.436395][ T6491] __lookup_hash+0xc8/0x240 [ 2302.440875][ T6491] filename_create+0x1c1/0x6f0 [ 2302.445619][ T6491] ? kern_path_create+0x40/0x40 [ 2302.450445][ T6491] do_mkdirat+0xad/0x320 [ 2302.454667][ T6491] ? vfs_mkdir+0x5f0/0x5f0 [ 2302.459065][ T6491] do_syscall_64+0xcb/0x150 [ 2302.463548][ T6491] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2302.469419][ T6491] RIP: 0033:0x45d277 [ 2302.473296][ T6491] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2302.492880][ T6491] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2302.501271][ T6491] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2302.509219][ T6491] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 18:55:22 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000011000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200480000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2302.517176][ T6491] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2302.525125][ T6491] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2302.533107][ T6491] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2302.558803][ T6492] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2302.571270][ T6492] EXT4-fs (loop3): get root inode failed [ 2302.578005][ T6492] EXT4-fs (loop3): mount failed 18:55:22 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xe, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204480000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:22 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xe000000) 18:55:22 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:22 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000012000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x20000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2302.795949][ T6492] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2302.814929][ T6492] EXT4-fs (loop3): get root inode failed [ 2302.821581][ T6492] EXT4-fs (loop3): mount failed 18:55:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0204490000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02044a0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02044b0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2302.884937][ T6523] FAULT_INJECTION: forcing a failure. [ 2302.884937][ T6523] name failslab, interval 1, probability 0, space 0, times 0 [ 2302.897743][ T6523] CPU: 0 PID: 6523 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2302.907793][ T6523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2302.917830][ T6523] Call Trace: [ 2302.921119][ T6523] dump_stack+0x1b0/0x21e [ 2302.925444][ T6523] ? devkmsg_release+0x11c/0x11c [ 2302.930376][ T6523] ? show_regs_print_info+0x12/0x12 [ 2302.935560][ T6523] ? arch_stack_walk+0x78/0xe0 [ 2302.940313][ T6523] should_fail+0x6fb/0x860 [ 2302.944716][ T6523] ? setup_fault_attr+0x2b0/0x2b0 [ 2302.949725][ T6523] ? memset+0x1f/0x40 [ 2302.953702][ T6523] ? ebitmap_cmp+0x1c8/0x230 [ 2302.958277][ T6523] ? mls_compute_context_len+0x7f0/0x820 [ 2302.963880][ T6523] ? context_struct_to_string+0x3b5/0x7f0 [ 2302.969570][ T6523] should_failslab+0x5/0x20 [ 2302.974044][ T6523] __kmalloc+0x5f/0x2c0 [ 2302.978184][ T6523] context_struct_to_string+0x3b5/0x7f0 [ 2302.983716][ T6523] ? security_bounded_transition+0x520/0x520 [ 2302.989687][ T6523] ? mls_range_isvalid+0x363/0x480 [ 2302.994776][ T6523] context_add_hash+0xf5/0x200 [ 2302.999517][ T6523] ? security_sid_to_context_inval+0x40/0x40 [ 2303.005464][ T6523] ? mls_context_isvalid+0x98/0x380 [ 2303.010633][ T6523] ? policydb_context_isvalid+0x1b6/0x400 [ 2303.016327][ T6523] security_compute_sid+0x1147/0x1be0 [ 2303.021710][ T6523] ? security_transition_sid+0x90/0x90 [ 2303.027138][ T6523] ? avc_denied+0x1c0/0x1c0 [ 2303.031612][ T6523] ? _raw_spin_unlock+0x5/0x20 [ 2303.036346][ T6523] ? __d_add+0x53b/0x820 [ 2303.040566][ T6523] ? dput+0x4d9/0x5e0 [ 2303.044543][ T6523] ? __d_add+0x6a/0x820 [ 2303.048669][ T6523] ? __rcu_read_lock+0x50/0x50 [ 2303.053420][ T6523] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 2303.058762][ T6523] security_transition_sid+0x78/0x90 [ 2303.064019][ T6523] may_create+0x5e0/0x930 [ 2303.068328][ T6523] ? show_sid+0x210/0x210 [ 2303.072643][ T6523] ? selinux_inode_follow_link+0x2aa/0x390 [ 2303.078418][ T6523] ? from_kgid+0x203/0x350 [ 2303.082805][ T6523] ? make_kgid+0x390/0x390 [ 2303.087202][ T6523] ? filename_create+0x47b/0x6f0 [ 2303.092110][ T6523] ? generic_permission+0x13a/0x4a0 [ 2303.097279][ T6523] security_inode_mkdir+0xa6/0x130 [ 2303.102359][ T6523] vfs_mkdir+0x34e/0x5f0 [ 2303.106575][ T6523] do_mkdirat+0x1e0/0x320 [ 2303.110881][ T6523] ? vfs_mkdir+0x5f0/0x5f0 [ 2303.115268][ T6523] do_syscall_64+0xcb/0x150 [ 2303.119745][ T6523] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2303.125608][ T6523] RIP: 0033:0x45d277 [ 2303.129497][ T6523] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2303.149176][ T6523] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2303.157553][ T6523] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2303.165493][ T6523] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2303.173437][ T6523] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 18:55:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02004c0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:22 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000025000000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:22 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02044c0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2303.181378][ T6523] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2303.189349][ T6523] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2303.373884][ T6541] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2303.385999][ T6541] EXT4-fs (loop3): get root inode failed [ 2303.390417][ T6525] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2303.393471][ T6541] EXT4-fs (loop3): mount failed 18:55:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x20100000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:23 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xf, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:23 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200600000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:23 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x10000000) 18:55:23 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040020000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2303.455030][ T6541] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2303.466746][ T6541] EXT4-fs (loop3): get root inode failed [ 2303.472889][ T6541] EXT4-fs (loop3): mount failed 18:55:23 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0201610000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:23 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200680000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2303.549354][ T6564] FAULT_INJECTION: forcing a failure. [ 2303.549354][ T6564] name failslab, interval 1, probability 0, space 0, times 0 [ 2303.566538][ T6564] CPU: 1 PID: 6564 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2303.576602][ T6564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2303.586651][ T6564] Call Trace: [ 2303.589943][ T6564] dump_stack+0x1b0/0x21e [ 2303.594269][ T6564] ? devkmsg_release+0x11c/0x11c 18:55:23 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040030000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2303.599204][ T6564] ? show_regs_print_info+0x12/0x12 [ 2303.604400][ T6564] ? __rcu_read_lock+0x50/0x50 [ 2303.609170][ T6564] should_fail+0x6fb/0x860 [ 2303.613582][ T6564] ? setup_fault_attr+0x2b0/0x2b0 [ 2303.618597][ T6564] ? ext4_alloc_inode+0x1b/0x620 [ 2303.623525][ T6564] should_failslab+0x5/0x20 [ 2303.628022][ T6564] kmem_cache_alloc+0x36/0x250 [ 2303.632778][ T6564] ? set_qf_name+0x350/0x350 [ 2303.637356][ T6564] ext4_alloc_inode+0x1b/0x620 [ 2303.642109][ T6564] ? set_qf_name+0x350/0x350 [ 2303.646690][ T6564] new_inode_pseudo+0x64/0x240 [ 2303.651437][ T6564] new_inode+0x25/0x1d0 [ 2303.655565][ T6564] __ext4_new_inode+0x609/0x5ce0 [ 2303.660475][ T6564] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 2303.665832][ T6564] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 2303.671520][ T6564] ? __d_add+0x6a/0x820 [ 2303.675646][ T6564] ? memset+0x1f/0x40 [ 2303.679598][ T6564] ? __dquot_initialize+0x228/0xdc0 [ 2303.684775][ T6564] ? avc_has_perm+0xbd/0x260 [ 2303.689347][ T6564] ? security_transition_sid+0x78/0x90 [ 2303.694783][ T6564] ext4_mkdir+0x41e/0x1530 [ 2303.699183][ T6564] ? from_kgid+0x203/0x350 [ 2303.703569][ T6564] ? ext4_symlink+0x1020/0x1020 [ 2303.708399][ T6564] ? filename_create+0x47b/0x6f0 [ 2303.713323][ T6564] ? generic_permission+0x13a/0x4a0 [ 2303.718494][ T6564] ? security_inode_mkdir+0xed/0x130 [ 2303.723755][ T6564] vfs_mkdir+0x420/0x5f0 [ 2303.727975][ T6564] do_mkdirat+0x1e0/0x320 [ 2303.732290][ T6564] ? vfs_mkdir+0x5f0/0x5f0 [ 2303.736676][ T6564] do_syscall_64+0xcb/0x150 [ 2303.741153][ T6564] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2303.747012][ T6564] RIP: 0033:0x45d277 [ 2303.750877][ T6564] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2303.770463][ T6564] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2303.778856][ T6564] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2303.786800][ T6564] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 18:55:23 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02006c0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:23 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02016d0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:23 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2303.794747][ T6564] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2303.802693][ T6564] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2303.810638][ T6564] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:23 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200740000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2303.895464][ T6574] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2303.907877][ T6574] EXT4-fs (loop3): get root inode failed [ 2303.908172][ T6575] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2303.914459][ T6574] EXT4-fs (loop3): mount failed [ 2303.928378][ T6592] FAULT_INJECTION: forcing a failure. [ 2303.928378][ T6592] name failslab, interval 1, probability 0, space 0, times 0 [ 2303.943000][ T6592] CPU: 1 PID: 6592 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2303.953059][ T6592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2303.963088][ T6592] Call Trace: [ 2303.966357][ T6592] dump_stack+0x1b0/0x21e [ 2303.970657][ T6592] ? devkmsg_release+0x11c/0x11c [ 2303.975567][ T6592] ? show_regs_print_info+0x12/0x12 [ 2303.980744][ T6592] ? mls_compute_context_len+0x7f0/0x820 [ 2303.986348][ T6592] should_fail+0x6fb/0x860 [ 2303.990735][ T6592] ? setup_fault_attr+0x2b0/0x2b0 [ 2303.995728][ T6592] ? should_fail+0x182/0x860 [ 2304.000287][ T6592] ? context_to_sid+0x63c/0x6b0 [ 2304.005109][ T6592] ? setup_fault_attr+0x2b0/0x2b0 [ 2304.010103][ T6592] ? make_kgid+0x225/0x390 [ 2304.014493][ T6592] ? security_inode_alloc+0x32/0x1f0 [ 2304.019751][ T6592] should_failslab+0x5/0x20 [ 2304.024227][ T6592] kmem_cache_alloc+0x36/0x250 [ 2304.028965][ T6592] security_inode_alloc+0x32/0x1f0 [ 2304.034049][ T6592] inode_init_always+0x37c/0x800 [ 2304.038955][ T6592] ? set_qf_name+0x350/0x350 [ 2304.043529][ T6592] new_inode_pseudo+0x7b/0x240 [ 2304.048261][ T6592] new_inode+0x25/0x1d0 [ 2304.052404][ T6592] __ext4_new_inode+0x609/0x5ce0 [ 2304.057323][ T6592] ? avc_has_perm_noaudit+0x2fc/0x3f0 [ 2304.062671][ T6592] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 2304.068358][ T6592] ? __d_add+0x6a/0x820 [ 2304.072505][ T6592] ? memset+0x1f/0x40 [ 2304.076457][ T6592] ? __dquot_initialize+0x228/0xdc0 [ 2304.081632][ T6592] ? avc_has_perm+0xbd/0x260 [ 2304.086210][ T6592] ? security_transition_sid+0x78/0x90 [ 2304.091643][ T6592] ext4_mkdir+0x41e/0x1530 [ 2304.096142][ T6592] ? from_kgid+0x203/0x350 [ 2304.100529][ T6592] ? ext4_symlink+0x1020/0x1020 [ 2304.105369][ T6592] ? filename_create+0x47b/0x6f0 [ 2304.110284][ T6592] ? generic_permission+0x13a/0x4a0 [ 2304.115466][ T6592] ? security_inode_mkdir+0xed/0x130 [ 2304.120771][ T6592] vfs_mkdir+0x420/0x5f0 [ 2304.124986][ T6592] do_mkdirat+0x1e0/0x320 [ 2304.129283][ T6592] ? vfs_mkdir+0x5f0/0x5f0 [ 2304.133701][ T6592] do_syscall_64+0xcb/0x150 [ 2304.138183][ T6592] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2304.144049][ T6592] RIP: 0033:0x45d277 [ 2304.147928][ T6592] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2304.167503][ T6592] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2304.175883][ T6592] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2304.183847][ T6592] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2304.191798][ T6592] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2304.199737][ T6592] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2304.207696][ T6592] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2304.330306][ T6574] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2304.351122][ T6574] EXT4-fs (loop3): get root inode failed [ 2304.358952][ T6574] EXT4-fs (loop3): mount failed 18:55:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x10, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:24 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040040000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:24 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x22000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x11000000) 18:55:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0201790000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02007a0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2304.483751][ T6613] FAULT_INJECTION: forcing a failure. [ 2304.483751][ T6613] name failslab, interval 1, probability 0, space 0, times 0 [ 2304.496483][ T6613] CPU: 0 PID: 6613 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2304.506533][ T6613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2304.516574][ T6613] Call Trace: [ 2304.519861][ T6613] dump_stack+0x1b0/0x21e [ 2304.524185][ T6613] ? devkmsg_release+0x11c/0x11c [ 2304.529121][ T6613] ? show_regs_print_info+0x12/0x12 [ 2304.534314][ T6613] ? arch_stack_walk+0x78/0xe0 [ 2304.539074][ T6613] should_fail+0x6fb/0x860 [ 2304.543493][ T6613] ? setup_fault_attr+0x2b0/0x2b0 [ 2304.548510][ T6613] ? ebitmap_cmp+0x1c8/0x230 [ 2304.553099][ T6613] ? mls_compute_context_len+0x7f0/0x820 [ 2304.558725][ T6613] ? context_struct_to_string+0x3b5/0x7f0 [ 2304.564442][ T6613] should_failslab+0x5/0x20 [ 2304.568935][ T6613] __kmalloc+0x5f/0x2c0 [ 2304.573082][ T6613] context_struct_to_string+0x3b5/0x7f0 [ 2304.578626][ T6613] ? security_bounded_transition+0x520/0x520 [ 2304.584584][ T6613] ? mls_range_isvalid+0x363/0x480 [ 2304.589672][ T6613] context_add_hash+0xf5/0x200 [ 2304.594416][ T6613] ? security_sid_to_context_inval+0x40/0x40 [ 2304.600387][ T6613] ? mls_context_isvalid+0x98/0x380 [ 2304.605565][ T6613] ? policydb_context_isvalid+0x1b6/0x400 [ 2304.611260][ T6613] security_compute_sid+0x1147/0x1be0 [ 2304.616612][ T6613] ? security_transition_sid+0x90/0x90 [ 2304.622053][ T6613] ? page_cache_prev_miss+0x3e0/0x3e0 [ 2304.627405][ T6613] ? __rcu_read_lock+0x50/0x50 [ 2304.632143][ T6613] ? xas_load+0x468/0x4c0 [ 2304.636453][ T6613] ? ext4_mkdir+0x41e/0x1530 [ 2304.641035][ T6613] ? page_cache_prev_miss+0x3e0/0x3e0 [ 2304.646387][ T6613] ? __find_get_block+0xb99/0x1010 [ 2304.651479][ T6613] security_transition_sid+0x78/0x90 [ 2304.656755][ T6613] selinux_inode_init_security+0x451/0xa70 [ 2304.662544][ T6613] ? selinux_inode_free_security+0x1d0/0x1d0 [ 2304.668501][ T6613] ? crc16+0x1e6/0x230 [ 2304.672550][ T6613] ? ext4_group_desc_csum+0x85d/0xbf0 [ 2304.677902][ T6613] security_inode_init_security+0x15f/0x390 [ 2304.683772][ T6613] ? ext4_init_security+0x40/0x40 [ 2304.688775][ T6613] ? security_dentry_create_files_as+0xe0/0xe0 [ 2304.694907][ T6613] ? _raw_spin_unlock+0x5/0x20 [ 2304.699648][ T6613] __ext4_new_inode+0x4707/0x5ce0 [ 2304.704671][ T6613] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 2304.710367][ T6613] ? __d_add+0x6a/0x820 [ 2304.714503][ T6613] ? memset+0x1f/0x40 [ 2304.718465][ T6613] ? __dquot_initialize+0x228/0xdc0 [ 2304.723644][ T6613] ? security_transition_sid+0x78/0x90 [ 2304.729081][ T6613] ext4_mkdir+0x41e/0x1530 [ 2304.733507][ T6613] ? from_kgid+0x203/0x350 [ 2304.737905][ T6613] ? ext4_symlink+0x1020/0x1020 [ 2304.742732][ T6613] ? filename_create+0x47b/0x6f0 [ 2304.747645][ T6613] ? generic_permission+0x13a/0x4a0 [ 2304.752822][ T6613] ? security_inode_mkdir+0xed/0x130 [ 2304.758084][ T6613] vfs_mkdir+0x420/0x5f0 [ 2304.762309][ T6613] do_mkdirat+0x1e0/0x320 [ 2304.766616][ T6613] ? vfs_mkdir+0x5f0/0x5f0 [ 2304.771024][ T6613] do_syscall_64+0xcb/0x150 [ 2304.775510][ T6613] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2304.781379][ T6613] RIP: 0033:0x45d277 [ 2304.785254][ T6613] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2304.804836][ T6613] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2304.813243][ T6613] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2304.821196][ T6613] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 18:55:24 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040050000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0202860000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x26000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0202920000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02029e0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2304.829147][ T6613] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2304.837099][ T6613] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2304.845047][ T6613] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2304.857811][ T6612] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2304.978067][ T6625] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2304.989876][ T6625] EXT4-fs (loop3): get root inode failed [ 2304.995577][ T6625] EXT4-fs (loop3): mount failed [ 2305.065113][ T6625] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2305.076973][ T6625] EXT4-fs (loop3): get root inode failed [ 2305.083053][ T6625] EXT4-fs (loop3): mount failed 18:55:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x12000000) 18:55:24 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x11, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:24 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02c0ed0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:24 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040060000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x30050000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0203f70000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:24 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0201fe0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:24 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040070000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2305.176087][ T6649] FAULT_INJECTION: forcing a failure. [ 2305.176087][ T6649] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.188870][ T6649] CPU: 0 PID: 6649 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2305.198913][ T6649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2305.208962][ T6649] Call Trace: [ 2305.212252][ T6649] dump_stack+0x1b0/0x21e [ 2305.216576][ T6649] ? devkmsg_release+0x11c/0x11c [ 2305.221510][ T6649] ? show_regs_print_info+0x12/0x12 [ 2305.226706][ T6649] ? mls_context_isvalid+0x98/0x380 [ 2305.231900][ T6649] should_fail+0x6fb/0x860 [ 2305.236315][ T6649] ? setup_fault_attr+0x2b0/0x2b0 [ 2305.241330][ T6649] ? ebitmap_cmp+0x1c8/0x230 [ 2305.245907][ T6649] ? mls_compute_context_len+0x7f0/0x820 [ 2305.251517][ T6649] ? context_struct_to_string+0x3b5/0x7f0 [ 2305.257215][ T6649] should_failslab+0x5/0x20 [ 2305.261708][ T6649] __kmalloc+0x5f/0x2c0 [ 2305.265851][ T6649] context_struct_to_string+0x3b5/0x7f0 [ 2305.271382][ T6649] ? security_bounded_transition+0x520/0x520 [ 2305.277348][ T6649] ? ext4_mkdir+0x41e/0x1530 [ 2305.281922][ T6649] ? sidtab_search_force+0x139/0x330 [ 2305.287187][ T6649] security_sid_to_context_core+0x270/0x3a0 [ 2305.293065][ T6649] selinux_inode_init_security+0x6a9/0xa70 [ 2305.298877][ T6649] ? selinux_inode_free_security+0x1d0/0x1d0 [ 2305.304845][ T6649] ? crc16+0x1e6/0x230 [ 2305.308898][ T6649] ? ext4_group_desc_csum+0x85d/0xbf0 [ 2305.314253][ T6649] security_inode_init_security+0x15f/0x390 [ 2305.320127][ T6649] ? ext4_init_security+0x40/0x40 [ 2305.325145][ T6649] ? security_dentry_create_files_as+0xe0/0xe0 [ 2305.331309][ T6649] ? _raw_spin_unlock+0x5/0x20 [ 2305.336055][ T6649] __ext4_new_inode+0x4707/0x5ce0 [ 2305.341071][ T6649] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 2305.346770][ T6649] ? __d_add+0x6a/0x820 [ 2305.350903][ T6649] ? memset+0x1f/0x40 [ 2305.354865][ T6649] ? __dquot_initialize+0x228/0xdc0 [ 2305.360044][ T6649] ? security_transition_sid+0x78/0x90 [ 2305.365489][ T6649] ext4_mkdir+0x41e/0x1530 [ 2305.369891][ T6649] ? from_kgid+0x203/0x350 [ 2305.374287][ T6649] ? ext4_symlink+0x1020/0x1020 [ 2305.379113][ T6649] ? filename_create+0x47b/0x6f0 [ 2305.384113][ T6649] ? generic_permission+0x13a/0x4a0 [ 2305.389320][ T6649] ? security_inode_mkdir+0xed/0x130 [ 2305.394582][ T6649] vfs_mkdir+0x420/0x5f0 [ 2305.398821][ T6649] do_mkdirat+0x1e0/0x320 [ 2305.403130][ T6649] ? vfs_mkdir+0x5f0/0x5f0 [ 2305.407525][ T6649] do_syscall_64+0xcb/0x150 [ 2305.412010][ T6649] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2305.417879][ T6649] RIP: 0033:0x45d277 [ 2305.421755][ T6649] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2305.441381][ T6649] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2305.449777][ T6649] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2305.457725][ T6649] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2305.465674][ T6649] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 18:55:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020fff0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x3f000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2305.473620][ T6649] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2305.481584][ T6649] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2305.534529][ T6652] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x20000000) [ 2305.613583][ T6664] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2305.625490][ T6664] EXT4-fs (loop3): get root inode failed [ 2305.631168][ T6664] EXT4-fs (loop3): mount failed 18:55:25 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040080000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0240000800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x24000000) 18:55:25 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x12, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:25 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x40000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2305.759956][ T6664] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2305.773290][ T6677] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2305.782360][ T6664] EXT4-fs (loop3): get root inode failed [ 2305.788915][ T6664] EXT4-fs (loop3): mount failed 18:55:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000001000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000002000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000003000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2305.914379][ T6691] FAULT_INJECTION: forcing a failure. [ 2305.914379][ T6691] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.927993][ T6691] CPU: 1 PID: 6691 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2305.938057][ T6691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2305.948105][ T6691] Call Trace: [ 2305.951431][ T6691] dump_stack+0x1b0/0x21e [ 2305.955765][ T6691] ? devkmsg_release+0x11c/0x11c 18:55:25 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2305.960812][ T6691] ? show_regs_print_info+0x12/0x12 [ 2305.966007][ T6691] should_fail+0x6fb/0x860 [ 2305.970418][ T6691] ? setup_fault_attr+0x2b0/0x2b0 [ 2305.975433][ T6691] ? kcalloc+0x2b/0x50 [ 2305.979493][ T6691] should_failslab+0x5/0x20 [ 2305.984001][ T6691] __kmalloc+0x5f/0x2c0 [ 2305.988151][ T6691] ? __rcu_read_lock+0x50/0x50 [ 2305.992916][ T6691] ? security_inode_init_security+0x2a8/0x390 [ 2305.998979][ T6691] kcalloc+0x2b/0x50 [ 2306.002867][ T6691] ext4_find_extent+0x2bb/0xce0 [ 2306.007708][ T6691] ? __ext4_handle_dirty_metadata+0x2d8/0x900 [ 2306.013768][ T6691] ext4_ext_map_blocks+0x344/0x4650 [ 2306.018964][ T6691] ? ext4_mark_iloc_dirty+0x245f/0x3400 [ 2306.024491][ T6691] ? ext4_ext_release+0x10/0x10 [ 2306.029332][ T6691] ? ext4_chunk_trans_blocks+0x280/0x280 [ 2306.034971][ T6691] ? __down_read+0xf1/0x210 [ 2306.039485][ T6691] ? percpu_counter_add_batch+0x12d/0x150 [ 2306.045171][ T6691] ? __init_rwsem+0x120/0x120 [ 2306.049823][ T6691] ? _raw_read_unlock+0xe/0x30 [ 2306.054606][ T6691] ? ext4_es_lookup_extent+0x415/0x900 [ 2306.060034][ T6691] ext4_map_blocks+0x480/0x1e30 [ 2306.064857][ T6691] ? _raw_spin_unlock+0x5/0x20 [ 2306.069728][ T6691] ? ext4_issue_zeroout+0x160/0x160 [ 2306.074896][ T6691] ? __brelse+0x54/0x90 [ 2306.079030][ T6691] ext4_getblk+0xff/0x550 [ 2306.083344][ T6691] ? ext4_get_block_trans+0x5a0/0x5a0 [ 2306.088738][ T6691] ? memset+0x1f/0x40 [ 2306.092793][ T6691] ext4_bread+0x8e/0x390 [ 2306.097005][ T6691] ? ext4_getblk+0x550/0x550 [ 2306.101566][ T6691] ext4_append+0x153/0x2d0 [ 2306.105952][ T6691] ext4_mkdir+0x7f8/0x1530 [ 2306.110370][ T6691] ? from_kgid+0x203/0x350 [ 2306.114765][ T6691] ? ext4_symlink+0x1020/0x1020 [ 2306.119589][ T6691] ? filename_create+0x47b/0x6f0 [ 2306.124514][ T6691] ? security_inode_mkdir+0xed/0x130 [ 2306.129770][ T6691] vfs_mkdir+0x420/0x5f0 [ 2306.133996][ T6691] do_mkdirat+0x1e0/0x320 [ 2306.138311][ T6691] ? vfs_mkdir+0x5f0/0x5f0 [ 2306.142716][ T6691] do_syscall_64+0xcb/0x150 [ 2306.147226][ T6691] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2306.153157][ T6691] RIP: 0033:0x45d277 [ 2306.157060][ T6691] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2306.176639][ T6691] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2306.185021][ T6691] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2306.192964][ T6691] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2306.200905][ T6691] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 18:55:25 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040090000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2306.208850][ T6691] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2306.216891][ T6691] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x40000800, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2306.257900][ T6691] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2306.290223][ T6705] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2306.300471][ T6704] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2306.311501][ T6705] EXT4-fs (loop3): get root inode failed [ 2306.317611][ T6705] EXT4-fs (loop3): mount failed [ 2306.446339][ T6705] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2306.458952][ T6705] EXT4-fs (loop3): get root inode failed [ 2306.464826][ T6705] EXT4-fs (loop3): mount failed 18:55:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x22, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:26 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000005000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000400a0000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x40000000) 18:55:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x48000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000006000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000007000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000008000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000009000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x80040000) [ 2306.645116][ T6734] FAULT_INJECTION: forcing a failure. [ 2306.645116][ T6734] name failslab, interval 1, probability 0, space 0, times 0 [ 2306.657761][ T6734] CPU: 0 PID: 6734 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2306.659138][ T6733] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2306.667805][ T6734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2306.667809][ T6734] Call Trace: [ 2306.667828][ T6734] dump_stack+0x1b0/0x21e 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000a000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2306.667838][ T6734] ? devkmsg_release+0x11c/0x11c [ 2306.667848][ T6734] ? show_regs_print_info+0x12/0x12 [ 2306.667858][ T6734] ? __es_remove_extent+0xbf7/0x2290 [ 2306.667871][ T6734] should_fail+0x6fb/0x860 [ 2306.667881][ T6734] ? setup_fault_attr+0x2b0/0x2b0 [ 2306.667890][ T6734] ? __kasan_kmalloc+0x117/0x1b0 [ 2306.667905][ T6734] ? __kmalloc+0xf7/0x2c0 [ 2306.728283][ T6734] ? kcalloc+0x2b/0x50 [ 2306.732332][ T6734] ? ext4_find_extent+0x2bb/0xce0 [ 2306.737335][ T6734] ? ext4_getblk+0xff/0x550 [ 2306.741817][ T6734] ? ext4_bread+0x8e/0x390 [ 2306.746203][ T6734] ? ext4_append+0x153/0x2d0 [ 2306.750763][ T6734] ? ext4_mkdir+0x7f8/0x1530 [ 2306.755321][ T6734] ? __es_insert_extent+0x7a4/0x1770 [ 2306.760580][ T6734] should_failslab+0x5/0x20 [ 2306.765053][ T6734] kmem_cache_alloc+0x36/0x250 [ 2306.769795][ T6734] ? unwind_get_return_address+0x48/0x90 [ 2306.775414][ T6734] __es_insert_extent+0x7a4/0x1770 [ 2306.780494][ T6734] ? _raw_write_lock+0xa1/0x170 [ 2306.785318][ T6734] ? should_fail+0x182/0x860 [ 2306.789899][ T6734] ext4_es_insert_extent+0x42b/0x2f40 [ 2306.795240][ T6734] ? ext4_es_scan_clu+0x270/0x270 [ 2306.800231][ T6734] ? __es_find_extent_range+0x275/0x620 [ 2306.805744][ T6734] ? ext4_ext_convert_to_initialized+0x1d70/0x1d70 [ 2306.812214][ T6734] ? ext4_ext_convert_to_initialized+0x1d70/0x1d70 [ 2306.818679][ T6734] ? ext4_es_find_extent_range+0x1a7/0x300 [ 2306.824451][ T6734] ? __ext4_handle_dirty_metadata+0x2d8/0x900 [ 2306.830484][ T6734] ext4_ext_map_blocks+0x164b/0x4650 [ 2306.835758][ T6734] ? ext4_ext_release+0x10/0x10 [ 2306.840577][ T6734] ? ext4_chunk_trans_blocks+0x280/0x280 [ 2306.846180][ T6734] ? __down_read+0xf1/0x210 [ 2306.850663][ T6734] ? percpu_counter_add_batch+0x12d/0x150 [ 2306.856349][ T6734] ? __init_rwsem+0x120/0x120 [ 2306.860991][ T6734] ? _raw_read_unlock+0xe/0x30 [ 2306.865721][ T6734] ? ext4_es_lookup_extent+0x415/0x900 [ 2306.871147][ T6734] ext4_map_blocks+0x480/0x1e30 [ 2306.875965][ T6734] ? _raw_spin_unlock+0x5/0x20 [ 2306.880710][ T6734] ? ext4_issue_zeroout+0x160/0x160 [ 2306.885894][ T6734] ? __brelse+0x54/0x90 [ 2306.890041][ T6734] ext4_getblk+0xff/0x550 [ 2306.894353][ T6734] ? ext4_get_block_trans+0x5a0/0x5a0 [ 2306.899708][ T6734] ? memset+0x1f/0x40 [ 2306.903659][ T6734] ext4_bread+0x8e/0x390 [ 2306.907868][ T6734] ? ext4_getblk+0x550/0x550 [ 2306.912442][ T6734] ext4_append+0x153/0x2d0 [ 2306.916825][ T6734] ext4_mkdir+0x7f8/0x1530 [ 2306.921210][ T6734] ? from_kgid+0x203/0x350 [ 2306.925602][ T6734] ? ext4_symlink+0x1020/0x1020 [ 2306.930418][ T6734] ? filename_create+0x47b/0x6f0 [ 2306.935324][ T6734] ? security_inode_mkdir+0xed/0x130 [ 2306.940597][ T6734] vfs_mkdir+0x420/0x5f0 [ 2306.944851][ T6734] do_mkdirat+0x1e0/0x320 [ 2306.949150][ T6734] ? vfs_mkdir+0x5f0/0x5f0 [ 2306.953556][ T6734] do_syscall_64+0xcb/0x150 [ 2306.958028][ T6734] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2306.963887][ T6734] RIP: 0033:0x45d277 [ 2306.967765][ T6734] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2306.987357][ T6734] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2306.995744][ T6734] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2307.003682][ T6734] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2307.011668][ T6734] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2307.019613][ T6734] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2307.027570][ T6734] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2307.055254][ T6734] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2307.207140][ T6754] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2307.233189][ T6754] EXT4-fs (loop3): get root inode failed [ 2307.243026][ T6758] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2307.253100][ T6754] EXT4-fs (loop3): mount failed 18:55:26 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000400b0000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000b000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:26 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x23, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x4c000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xa1ffffff) 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000040b000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000c000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2307.289295][ T6754] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2307.300978][ T6754] EXT4-fs (loop3): get root inode failed [ 2307.307325][ T6754] EXT4-fs (loop3): mount failed 18:55:26 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000d000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:26 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000400c0000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2307.375322][ T6771] FAULT_INJECTION: forcing a failure. [ 2307.375322][ T6771] name failslab, interval 1, probability 0, space 0, times 0 [ 2307.394086][ T6771] CPU: 1 PID: 6771 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2307.404162][ T6771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2307.414199][ T6771] Call Trace: [ 2307.417483][ T6771] dump_stack+0x1b0/0x21e [ 2307.421793][ T6771] ? devkmsg_release+0x11c/0x11c [ 2307.426708][ T6771] ? __es_insert_extent+0x1157/0x1770 [ 2307.432083][ T6771] ? show_regs_print_info+0x12/0x12 [ 2307.437295][ T6771] ? _raw_write_lock+0xa1/0x170 [ 2307.442117][ T6771] should_fail+0x6fb/0x860 [ 2307.446503][ T6771] ? setup_fault_attr+0x2b0/0x2b0 [ 2307.451498][ T6771] ? ext4_es_insert_extent+0x2996/0x2f40 [ 2307.457101][ T6771] ? kcalloc+0x2b/0x50 [ 2307.461139][ T6771] should_failslab+0x5/0x20 [ 2307.465621][ T6771] __kmalloc+0x5f/0x2c0 [ 2307.469756][ T6771] ? slab_free_freelist_hook+0xd0/0x150 [ 2307.475270][ T6771] kcalloc+0x2b/0x50 [ 2307.479148][ T6771] ext4_find_extent+0x2bb/0xce0 [ 2307.483993][ T6771] ? ext4_ext_convert_to_initialized+0x1d70/0x1d70 [ 2307.490465][ T6771] ? __ext4_handle_dirty_metadata+0x2d8/0x900 [ 2307.496503][ T6771] ext4_ext_map_blocks+0x344/0x4650 [ 2307.501672][ T6771] ? ext4_ext_release+0x10/0x10 [ 2307.506509][ T6771] ? ext4_chunk_trans_blocks+0x280/0x280 [ 2307.512125][ T6771] ? down_write+0xd8/0x150 [ 2307.516509][ T6771] ? down_read_killable+0x220/0x220 [ 2307.521679][ T6771] ? ext4_es_lookup_extent+0x415/0x900 [ 2307.527141][ T6771] ext4_map_blocks+0x955/0x1e30 [ 2307.531964][ T6771] ? ext4_issue_zeroout+0x160/0x160 [ 2307.537139][ T6771] ? __brelse+0x54/0x90 [ 2307.541290][ T6771] ext4_getblk+0xff/0x550 [ 2307.545600][ T6771] ? ext4_get_block_trans+0x5a0/0x5a0 [ 2307.550945][ T6771] ? memset+0x1f/0x40 [ 2307.554901][ T6771] ext4_bread+0x8e/0x390 [ 2307.559126][ T6771] ? ext4_getblk+0x550/0x550 [ 2307.563691][ T6771] ext4_append+0x153/0x2d0 [ 2307.568078][ T6771] ext4_mkdir+0x7f8/0x1530 [ 2307.572476][ T6771] ? from_kgid+0x203/0x350 [ 2307.576885][ T6771] ? ext4_symlink+0x1020/0x1020 [ 2307.581718][ T6771] ? filename_create+0x47b/0x6f0 [ 2307.586638][ T6771] ? security_inode_mkdir+0xed/0x130 [ 2307.591901][ T6771] vfs_mkdir+0x420/0x5f0 [ 2307.596125][ T6771] do_mkdirat+0x1e0/0x320 [ 2307.600435][ T6771] ? vfs_mkdir+0x5f0/0x5f0 [ 2307.604833][ T6771] do_syscall_64+0xcb/0x150 [ 2307.609317][ T6771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2307.615189][ T6771] RIP: 0033:0x45d277 [ 2307.619067][ T6771] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2307.638672][ T6771] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2307.647524][ T6771] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2307.655572][ T6771] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2307.663523][ T6771] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000e000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000010000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2307.671471][ T6771] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2307.679424][ T6771] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x62030000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000011000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2307.749827][ T6782] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2307.762993][ T6782] EXT4-fs (loop3): get root inode failed [ 2307.768884][ T6782] EXT4-fs (loop3): mount failed 18:55:27 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2307.831015][ T6780] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2307.834694][ T6782] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2307.851964][ T6782] EXT4-fs (loop3): get root inode failed [ 2307.858309][ T6782] EXT4-fs (loop3): mount failed [ 2307.879810][ T6807] FAULT_INJECTION: forcing a failure. [ 2307.879810][ T6807] name failslab, interval 1, probability 0, space 0, times 0 [ 2307.892627][ T6807] CPU: 0 PID: 6807 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2307.902684][ T6807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2307.912717][ T6807] Call Trace: [ 2307.915981][ T6807] dump_stack+0x1b0/0x21e [ 2307.920282][ T6807] ? devkmsg_release+0x11c/0x11c [ 2307.925190][ T6807] ? show_regs_print_info+0x12/0x12 [ 2307.930358][ T6807] ? ext4_evict_inode+0x1a70/0x1a70 [ 2307.935526][ T6807] ? perf_trace_writeback_dirty_inode_template+0x27d/0x430 [ 2307.942688][ T6807] ? _raw_spin_unlock+0x5/0x20 [ 2307.947423][ T6807] ? ext4_append+0x153/0x2d0 [ 2307.952011][ T6807] should_fail+0x6fb/0x860 [ 2307.956417][ T6807] ? setup_fault_attr+0x2b0/0x2b0 [ 2307.961412][ T6807] ? inode_io_list_move_locked+0x2bb/0x300 [ 2307.967217][ T6807] ? ext4_mb_new_blocks+0x423/0x28a0 [ 2307.972476][ T6807] should_failslab+0x5/0x20 [ 2307.976969][ T6807] kmem_cache_alloc+0x36/0x250 [ 2307.981714][ T6807] ext4_mb_new_blocks+0x423/0x28a0 [ 2307.986817][ T6807] ? __kmalloc+0xf7/0x2c0 [ 2307.991116][ T6807] ? kcalloc+0x2b/0x50 [ 2307.995153][ T6807] ? ext4_mb_pa_callback+0xc0/0xc0 [ 2308.000257][ T6807] ? ext4_find_extent+0xa52/0xce0 [ 2308.005262][ T6807] ? ext4_inode_to_goal_block+0x263/0x370 [ 2308.010967][ T6807] ext4_ext_map_blocks+0x2d6d/0x4650 [ 2308.016277][ T6807] ? ext4_ext_release+0x10/0x10 [ 2308.021096][ T6807] ? ext4_es_lookup_extent+0x415/0x900 [ 2308.026540][ T6807] ext4_map_blocks+0x955/0x1e30 [ 2308.031361][ T6807] ? ext4_issue_zeroout+0x160/0x160 [ 2308.036526][ T6807] ? __brelse+0x54/0x90 [ 2308.040653][ T6807] ext4_getblk+0xff/0x550 [ 2308.044958][ T6807] ? ext4_get_block_trans+0x5a0/0x5a0 [ 2308.050313][ T6807] ? memset+0x1f/0x40 [ 2308.054281][ T6807] ext4_bread+0x8e/0x390 [ 2308.058495][ T6807] ? ext4_getblk+0x550/0x550 [ 2308.063057][ T6807] ext4_append+0x153/0x2d0 [ 2308.067441][ T6807] ext4_mkdir+0x7f8/0x1530 [ 2308.071830][ T6807] ? from_kgid+0x203/0x350 [ 2308.076223][ T6807] ? ext4_symlink+0x1020/0x1020 [ 2308.081087][ T6807] ? filename_create+0x47b/0x6f0 [ 2308.086034][ T6807] ? security_inode_mkdir+0xed/0x130 [ 2308.091290][ T6807] vfs_mkdir+0x420/0x5f0 [ 2308.095552][ T6807] do_mkdirat+0x1e0/0x320 [ 2308.099868][ T6807] ? vfs_mkdir+0x5f0/0x5f0 [ 2308.104278][ T6807] do_syscall_64+0xcb/0x150 [ 2308.108759][ T6807] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2308.114619][ T6807] RIP: 0033:0x45d277 [ 2308.118488][ T6807] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2308.138079][ T6807] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2308.146488][ T6807] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2308.154438][ T6807] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2308.162394][ T6807] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2308.170350][ T6807] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 18:55:27 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x25, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000012000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:27 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000400d0000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x63030000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xe4ffffff) 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000018000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2308.178315][ T6807] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000001f000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:27 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000020000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001020000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000022000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:27 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000025000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2308.321926][ T6829] FAULT_INJECTION: forcing a failure. [ 2308.321926][ T6829] name failslab, interval 1, probability 0, space 0, times 0 [ 2308.334619][ T6829] CPU: 0 PID: 6829 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2308.344657][ T6829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2308.354705][ T6829] Call Trace: [ 2308.357996][ T6829] dump_stack+0x1b0/0x21e [ 2308.362318][ T6829] ? devkmsg_release+0x11c/0x11c [ 2308.367251][ T6829] ? show_regs_print_info+0x12/0x12 [ 2308.372440][ T6829] ? __es_remove_extent+0xe94/0x2290 [ 2308.377721][ T6829] should_fail+0x6fb/0x860 [ 2308.382133][ T6829] ? setup_fault_attr+0x2b0/0x2b0 [ 2308.387153][ T6829] ? __es_insert_extent+0x7a4/0x1770 [ 2308.392452][ T6829] should_failslab+0x5/0x20 [ 2308.396965][ T6829] kmem_cache_alloc+0x36/0x250 [ 2308.401722][ T6829] __es_insert_extent+0x7a4/0x1770 [ 2308.406820][ T6829] ext4_es_insert_extent+0x42b/0x2f40 [ 2308.412173][ T6829] ? ext4_es_scan_clu+0x270/0x270 [ 2308.417178][ T6829] ? ext4_es_lookup_extent+0x415/0x900 [ 2308.422626][ T6829] ext4_map_blocks+0xe27/0x1e30 [ 2308.427458][ T6829] ? ext4_issue_zeroout+0x160/0x160 [ 2308.432634][ T6829] ? __brelse+0x54/0x90 [ 2308.436786][ T6829] ext4_getblk+0xff/0x550 [ 2308.441107][ T6829] ? ext4_get_block_trans+0x5a0/0x5a0 [ 2308.446475][ T6829] ? memset+0x1f/0x40 [ 2308.450436][ T6829] ext4_bread+0x8e/0x390 [ 2308.454657][ T6829] ? ext4_getblk+0x550/0x550 [ 2308.459228][ T6829] ext4_append+0x153/0x2d0 [ 2308.463644][ T6829] ext4_mkdir+0x7f8/0x1530 [ 2308.468058][ T6829] ? from_kgid+0x203/0x350 [ 2308.472453][ T6829] ? ext4_symlink+0x1020/0x1020 [ 2308.477281][ T6829] ? filename_create+0x47b/0x6f0 [ 2308.482203][ T6829] ? security_inode_mkdir+0xed/0x130 [ 2308.487491][ T6829] vfs_mkdir+0x420/0x5f0 [ 2308.491717][ T6829] do_mkdirat+0x1e0/0x320 [ 2308.496026][ T6829] ? vfs_mkdir+0x5f0/0x5f0 [ 2308.500439][ T6829] do_syscall_64+0xcb/0x150 [ 2308.504920][ T6829] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2308.510788][ T6829] RIP: 0033:0x45d277 [ 2308.514662][ T6829] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2308.534243][ T6829] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2308.542631][ T6829] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2308.550580][ T6829] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2308.558545][ T6829] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2308.566509][ T6829] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2308.574458][ T6829] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2308.632676][ T6828] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2308.644722][ T6828] EXT4-fs (loop3): get root inode failed [ 2308.650424][ T6828] EXT4-fs (loop3): mount failed [ 2308.662982][ T6829] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2308.663381][ T6836] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2308.733377][ T6828] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2308.746088][ T6828] EXT4-fs (loop3): get root inode failed [ 2308.751858][ T6828] EXT4-fs (loop3): mount failed 18:55:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x66030000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200002725000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2d, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:28 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000400e0000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:28 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xf6ffffff) 18:55:28 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040100000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000003f000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2308.890102][ T6855] FAULT_INJECTION: forcing a failure. [ 2308.890102][ T6855] name failslab, interval 1, probability 0, space 0, times 0 [ 2308.897426][ T6857] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2308.903409][ T6855] CPU: 0 PID: 6855 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2308.916247][ T6856] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2308.924317][ T6855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2308.924320][ T6855] Call Trace: [ 2308.924338][ T6855] dump_stack+0x1b0/0x21e [ 2308.924347][ T6855] ? devkmsg_release+0x11c/0x11c [ 2308.924354][ T6855] ? do_syscall_64+0xcb/0x150 [ 2308.924363][ T6855] ? show_regs_print_info+0x12/0x12 [ 2308.924371][ T6855] ? ext4_mb_new_blocks+0x1832/0x28a0 [ 2308.924382][ T6855] should_fail+0x6fb/0x860 [ 2308.924391][ T6855] ? setup_fault_attr+0x2b0/0x2b0 [ 2308.924400][ T6855] ? should_fail+0x182/0x860 [ 2308.924410][ T6855] ? mempool_alloc_slab+0x16/0x30 [ 2308.924417][ T6855] ? mempool_free+0x380/0x380 [ 2308.924430][ T6855] should_failslab+0x5/0x20 [ 2308.933805][ T6857] EXT4-fs (loop3): get root inode failed [ 2308.943291][ T6855] kmem_cache_alloc+0x36/0x250 [ 2308.943303][ T6855] ? mempool_free+0x380/0x380 [ 2308.943310][ T6855] mempool_alloc_slab+0x16/0x30 [ 2308.943317][ T6855] mempool_alloc+0x100/0x650 [ 2308.943328][ T6855] ? __rcu_read_lock+0x50/0x50 [ 2308.943337][ T6855] ? mempool_resize+0x910/0x910 [ 2308.943345][ T6855] ? find_get_entry+0x5da/0x670 [ 2308.943354][ T6855] ? page_cache_prev_miss+0x3e0/0x3e0 [ 2308.943368][ T6855] bio_alloc_bioset+0x1fc/0x660 [ 2308.948051][ T6857] EXT4-fs (loop3): mount failed [ 2308.950968][ T6855] ? __xa_set_mark+0x3a7/0x4c0 [ 2308.950979][ T6855] ? bio_chain_endio+0xf0/0xf0 [ 2308.950986][ T6855] ? __xa_alloc_cyclic+0x310/0x310 [ 2308.950997][ T6855] submit_bh_wbc+0x1ba/0x790 [ 2308.951007][ T6855] ? __mark_inode_dirty+0x475/0xbd0 [ 2308.951018][ T6855] __sync_dirty_buffer+0x1d2/0x2d0 [ 2308.951027][ T6855] __ext4_handle_dirty_metadata+0x184/0x900 [ 2308.951037][ T6855] ? __ext4_journal_get_create_access+0x300/0x300 [ 2308.951048][ T6855] ext4_getblk+0x443/0x550 [ 2308.951058][ T6855] ? ext4_get_block_trans+0x5a0/0x5a0 [ 2308.951069][ T6855] ? memset+0x1f/0x40 [ 2308.951082][ T6855] ext4_bread+0x8e/0x390 [ 2309.112304][ T6855] ? ext4_getblk+0x550/0x550 [ 2309.116869][ T6855] ext4_append+0x153/0x2d0 [ 2309.121254][ T6855] ext4_mkdir+0x7f8/0x1530 [ 2309.125646][ T6855] ? from_kgid+0x203/0x350 [ 2309.130029][ T6855] ? ext4_symlink+0x1020/0x1020 [ 2309.134847][ T6855] ? filename_create+0x47b/0x6f0 [ 2309.139771][ T6855] ? security_inode_mkdir+0xed/0x130 [ 2309.145027][ T6855] vfs_mkdir+0x420/0x5f0 [ 2309.149239][ T6855] do_mkdirat+0x1e0/0x320 [ 2309.153535][ T6855] ? vfs_mkdir+0x5f0/0x5f0 [ 2309.157934][ T6855] do_syscall_64+0xcb/0x150 [ 2309.162406][ T6855] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2309.168265][ T6855] RIP: 0033:0x45d277 [ 2309.172141][ T6855] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 18:55:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000040000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x67030000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2309.191715][ T6855] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2309.200097][ T6855] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2309.208055][ T6855] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2309.215996][ T6855] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2309.223937][ T6855] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2309.231887][ T6855] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200080040000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000440000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:28 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xfeffffff) 18:55:28 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2309.260900][ T6855] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 18:55:28 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040110000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:28 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2e, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000441000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000442000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2309.327229][ T6857] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2309.339021][ T6857] EXT4-fs (loop3): get root inode failed [ 2309.345819][ T6857] EXT4-fs (loop3): mount failed 18:55:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000443000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:28 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000444000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:29 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000445000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2309.498860][ T6893] FAULT_INJECTION: forcing a failure. [ 2309.498860][ T6893] name failslab, interval 1, probability 0, space 0, times 0 [ 2309.529402][ T6893] CPU: 1 PID: 6893 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2309.539486][ T6893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2309.549531][ T6893] Call Trace: [ 2309.552822][ T6893] dump_stack+0x1b0/0x21e [ 2309.557149][ T6893] ? devkmsg_release+0x11c/0x11c [ 2309.562090][ T6893] ? show_regs_print_info+0x12/0x12 [ 2309.567289][ T6893] ? __kasan_kmalloc+0x179/0x1b0 [ 2309.572215][ T6893] ? do_mkdirat+0x1e0/0x320 [ 2309.576749][ T6893] ? __kasan_kmalloc+0x117/0x1b0 [ 2309.581678][ T6893] ? kmem_cache_alloc+0x1d5/0x250 [ 2309.586701][ T6893] should_fail+0x6fb/0x860 [ 2309.591123][ T6893] ? setup_fault_attr+0x2b0/0x2b0 [ 2309.596138][ T6893] ? blk_partition_remap+0x4a0/0x8a0 [ 2309.601407][ T6893] ? create_task_io_context+0x28/0x3a0 [ 2309.606872][ T6893] should_failslab+0x5/0x20 [ 2309.611347][ T6893] kmem_cache_alloc+0x36/0x250 [ 2309.616080][ T6893] ? ext4_mb_new_blocks+0x1832/0x28a0 [ 2309.621447][ T6893] create_task_io_context+0x28/0x3a0 [ 2309.626733][ T6893] generic_make_request_checks+0xc55/0xf10 [ 2309.632507][ T6893] ? generic_make_request+0xde0/0xde0 [ 2309.637850][ T6893] ? mempool_alloc_slab+0x16/0x30 [ 2309.642865][ T6893] ? kmem_cache_alloc+0x1d5/0x250 [ 2309.647864][ T6893] ? mempool_free+0x380/0x380 [ 2309.652511][ T6893] ? mempool_alloc_slab+0x25/0x30 [ 2309.657505][ T6893] ? mempool_alloc+0x10d/0x650 [ 2309.662241][ T6893] ? __rcu_read_lock+0x50/0x50 [ 2309.667082][ T6893] generic_make_request+0xa7/0xde0 [ 2309.672193][ T6893] ? mempool_resize+0x910/0x910 [ 2309.677039][ T6893] ? find_get_entry+0x5da/0x670 [ 2309.681858][ T6893] ? blk_attempt_plug_merge+0x310/0x310 [ 2309.687373][ T6893] ? fscrypt_set_bio_crypt_ctx+0x162/0x4c0 [ 2309.693151][ T6893] ? __bio_add_page+0x274/0x430 [ 2309.697993][ T6893] submit_bio+0x11f/0x520 [ 2309.702293][ T6893] ? bio_add_page+0x2ea/0x470 [ 2309.706938][ T6893] ? direct_make_request+0x430/0x430 [ 2309.712299][ T6893] ? submit_bh_wbc+0x631/0x790 [ 2309.717035][ T6893] __sync_dirty_buffer+0x1d2/0x2d0 [ 2309.722116][ T6893] __ext4_handle_dirty_metadata+0x184/0x900 [ 2309.727978][ T6893] ? __ext4_journal_get_create_access+0x300/0x300 [ 2309.734378][ T6893] ext4_getblk+0x443/0x550 [ 2309.738764][ T6893] ? ext4_get_block_trans+0x5a0/0x5a0 [ 2309.744109][ T6893] ? memset+0x1f/0x40 [ 2309.748060][ T6893] ext4_bread+0x8e/0x390 [ 2309.752278][ T6893] ? ext4_getblk+0x550/0x550 [ 2309.756896][ T6893] ext4_append+0x153/0x2d0 [ 2309.761301][ T6893] ext4_mkdir+0x7f8/0x1530 [ 2309.765688][ T6893] ? from_kgid+0x203/0x350 [ 2309.770105][ T6893] ? ext4_symlink+0x1020/0x1020 [ 2309.774939][ T6893] ? filename_create+0x47b/0x6f0 [ 2309.779849][ T6893] ? security_inode_mkdir+0xed/0x130 [ 2309.785104][ T6893] vfs_mkdir+0x420/0x5f0 [ 2309.789319][ T6893] do_mkdirat+0x1e0/0x320 [ 2309.793626][ T6893] ? vfs_mkdir+0x5f0/0x5f0 [ 2309.798008][ T6893] do_syscall_64+0xcb/0x150 [ 2309.802483][ T6893] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2309.808343][ T6893] RIP: 0033:0x45d277 [ 2309.812233][ T6893] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2309.831842][ T6893] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2309.840254][ T6893] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 18:55:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x68000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:29 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000446000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:29 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040120000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2309.848216][ T6893] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2309.856166][ T6893] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2309.864153][ T6893] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2309.872094][ T6893] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2309.897712][ T6893] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2309.902718][ T6901] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2309.929386][ T6901] EXT4-fs (loop3): get root inode failed [ 2309.936564][ T6901] EXT4-fs (loop3): mount failed 18:55:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xff0f0000) 18:55:29 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000447000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:29 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2310.071299][ T6900] EXT4-fs: failed to create workqueue [ 2310.073208][ T6901] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2310.080999][ T6900] EXT4-fs (loop5): mount failed [ 2310.098465][ T6901] EXT4-fs (loop3): get root inode failed [ 2310.104164][ T6901] EXT4-fs (loop3): mount failed 18:55:29 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x44, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:29 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040130000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6a030000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:29 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000048000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:29 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000448000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:29 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000449000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:29 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000044a000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2310.224738][ T6926] FAULT_INJECTION: forcing a failure. [ 2310.224738][ T6926] name failslab, interval 1, probability 0, space 0, times 0 [ 2310.237675][ T6926] CPU: 1 PID: 6926 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2310.247726][ T6926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2310.257755][ T6926] Call Trace: [ 2310.261021][ T6926] dump_stack+0x1b0/0x21e [ 2310.265322][ T6926] ? devkmsg_release+0x11c/0x11c [ 2310.270237][ T6926] ? show_regs_print_info+0x12/0x12 [ 2310.275429][ T6926] should_fail+0x6fb/0x860 [ 2310.279825][ T6926] ? setup_fault_attr+0x2b0/0x2b0 [ 2310.284820][ T6926] ? is_mmconf_reserved+0x420/0x420 [ 2310.290000][ T6926] ? mempool_alloc_slab+0x16/0x30 [ 2310.295001][ T6926] ? mempool_free+0x380/0x380 [ 2310.299647][ T6926] should_failslab+0x5/0x20 [ 2310.304123][ T6926] kmem_cache_alloc+0x36/0x250 [ 2310.308920][ T6926] ? mempool_free+0x380/0x380 [ 2310.313565][ T6926] mempool_alloc_slab+0x16/0x30 [ 2310.318397][ T6926] mempool_alloc+0x100/0x650 [ 2310.322966][ T6926] ? __wait_on_bit+0x177/0x190 [ 2310.327699][ T6926] ? bit_wait+0x90/0x90 [ 2310.331827][ T6926] ? mempool_resize+0x910/0x910 [ 2310.336682][ T6926] ? out_of_line_wait_on_bit+0x1b5/0x230 [ 2310.342301][ T6926] ? bit_wait+0x90/0x90 [ 2310.346428][ T6926] ? __wait_on_bit+0x190/0x190 [ 2310.351173][ T6926] ? bit_waitqueue+0x30/0x30 [ 2310.355744][ T6926] bio_alloc_bioset+0x1fc/0x660 [ 2310.360565][ T6926] ? bio_chain_endio+0xf0/0xf0 [ 2310.365297][ T6926] ? __ext4_handle_dirty_metadata+0x404/0x900 [ 2310.371335][ T6926] submit_bh_wbc+0x1ba/0x790 [ 2310.375893][ T6926] ? lock_page_memcg+0x6e/0x140 [ 2310.380728][ T6926] ? mark_buffer_dirty+0x343/0x380 [ 2310.385816][ T6926] __sync_dirty_buffer+0x1d2/0x2d0 [ 2310.390896][ T6926] __ext4_handle_dirty_metadata+0x184/0x900 [ 2310.396758][ T6926] ? ext4_get_block_trans+0x5a0/0x5a0 [ 2310.402097][ T6926] ? __ext4_journal_get_create_access+0x300/0x300 [ 2310.408478][ T6926] ? memset+0x1f/0x40 [ 2310.412434][ T6926] ? __ext4_journal_get_write_access+0x83/0x300 [ 2310.418657][ T6926] ext4_handle_dirty_dirblock+0x363/0x6e0 [ 2310.424348][ T6926] ? ext4_dirblock_csum_verify+0x6e0/0x6e0 [ 2310.430130][ T6926] ? ext4_append+0x21c/0x2d0 [ 2310.434685][ T6926] ? ext4_mkdir+0xad3/0x1530 [ 2310.439242][ T6926] ? set_nlink+0x5a/0x170 [ 2310.443541][ T6926] ext4_mkdir+0xc44/0x1530 [ 2310.447926][ T6926] ? ext4_symlink+0x1020/0x1020 [ 2310.452747][ T6926] ? filename_create+0x47b/0x6f0 [ 2310.457664][ T6926] ? security_inode_mkdir+0xed/0x130 [ 2310.462937][ T6926] vfs_mkdir+0x420/0x5f0 [ 2310.467151][ T6926] do_mkdirat+0x1e0/0x320 [ 2310.471454][ T6926] ? vfs_mkdir+0x5f0/0x5f0 [ 2310.475844][ T6926] do_syscall_64+0xcb/0x150 [ 2310.480320][ T6926] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2310.486181][ T6926] RIP: 0033:0x45d277 [ 2310.490045][ T6926] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2310.509622][ T6926] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2310.518019][ T6926] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 18:55:30 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000044b000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:30 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000004c000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2310.525968][ T6926] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2310.533915][ T6926] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2310.541864][ T6926] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2310.549811][ T6926] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffefffff) 18:55:30 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000044c000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:30 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040220000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2310.709458][ T6926] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2310.719436][ T6933] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2310.829857][ T6957] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2310.843237][ T6957] EXT4-fs (loop3): get root inode failed [ 2310.848993][ T6957] EXT4-fs (loop3): mount failed [ 2310.930028][ T6965] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2310.944469][ T6957] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2310.962668][ T6957] EXT4-fs (loop3): get root inode failed [ 2310.968777][ T6957] EXT4-fs (loop3): mount failed 18:55:30 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x48, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6c000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:30 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:30 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000060000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:30 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040250000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffffefff) 18:55:30 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000161000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:30 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000068000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:30 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000006c000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:30 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040480000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x74000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2311.096471][ T6977] FAULT_INJECTION: forcing a failure. [ 2311.096471][ T6977] name failslab, interval 1, probability 0, space 0, times 0 [ 2311.136369][ T6977] CPU: 1 PID: 6977 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2311.146454][ T6977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2311.156496][ T6977] Call Trace: [ 2311.159779][ T6977] dump_stack+0x1b0/0x21e [ 2311.164090][ T6977] ? devkmsg_release+0x11c/0x11c [ 2311.169037][ T6977] ? show_regs_print_info+0x12/0x12 [ 2311.174221][ T6977] ? find_get_entry+0x5da/0x670 [ 2311.179082][ T6977] should_fail+0x6fb/0x860 [ 2311.183504][ T6977] ? setup_fault_attr+0x2b0/0x2b0 [ 2311.188511][ T6977] ? __rcu_read_lock+0x50/0x50 [ 2311.193272][ T6977] ? mempool_alloc_slab+0x16/0x30 [ 2311.198275][ T6977] ? mempool_free+0x380/0x380 [ 2311.202983][ T6977] should_failslab+0x5/0x20 [ 2311.207483][ T6977] kmem_cache_alloc+0x36/0x250 [ 2311.212234][ T6977] ? mempool_free+0x380/0x380 [ 2311.216919][ T6977] mempool_alloc_slab+0x16/0x30 [ 2311.221757][ T6977] mempool_alloc+0x100/0x650 [ 2311.226339][ T6977] ? write_boundary_block+0x150/0x150 [ 2311.231692][ T6977] ? mempool_resize+0x910/0x910 [ 2311.236531][ T6977] ? page_cache_prev_miss+0x3e0/0x3e0 [ 2311.241891][ T6977] ? __rcu_read_lock+0x50/0x50 [ 2311.246637][ T6977] ? mark_buffer_dirty+0x334/0x380 [ 2311.251732][ T6977] bio_alloc_bioset+0x1fc/0x660 [ 2311.256572][ T6977] ? bio_chain_endio+0xf0/0xf0 [ 2311.261322][ T6977] ? __ext4_get_inode_loc+0x499/0x1030 [ 2311.266767][ T6977] ? fscrypt_match_name+0x131/0x440 [ 2311.272029][ T6977] submit_bh_wbc+0x1ba/0x790 [ 2311.276627][ T6977] ? lock_page_memcg+0x6e/0x140 [ 2311.281463][ T6977] ? mark_buffer_dirty+0x343/0x380 [ 2311.286565][ T6977] __sync_dirty_buffer+0x1d2/0x2d0 [ 2311.291662][ T6977] __ext4_handle_dirty_metadata+0x184/0x900 [ 2311.297543][ T6977] ? __ext4_journal_get_create_access+0x300/0x300 [ 2311.303981][ T6977] ? ext4_mark_inode_dirty+0x5b0/0x730 [ 2311.309430][ T6977] ext4_handle_dirty_dirblock+0x363/0x6e0 [ 2311.315133][ T6977] ? ext4_dirblock_csum_verify+0x6e0/0x6e0 [ 2311.320922][ T6977] ? memcpy+0x38/0x50 [ 2311.324887][ T6977] ? add_dirent_to_buf+0x430/0x6e0 [ 2311.329978][ T6977] add_dirent_to_buf+0x5a4/0x6e0 [ 2311.334901][ T6977] ? ext4_add_entry+0x42a0/0x42a0 [ 2311.339908][ T6977] ? __ext4_read_dirblock+0x4d8/0xda0 [ 2311.345269][ T6977] ext4_add_entry+0x26a6/0x42a0 [ 2311.350102][ T6977] ? __ext4_journal_get_create_access+0x251/0x300 [ 2311.356501][ T6977] ? __ext4_get_inode_loc+0x499/0x1030 [ 2311.361946][ T6977] ? ext4_mark_iloc_dirty+0x245f/0x3400 [ 2311.367476][ T6977] ? ext4_dx_csum+0x5e0/0x5e0 [ 2311.372135][ T6977] ? ext4_chunk_trans_blocks+0x280/0x280 [ 2311.377762][ T6977] ? __ext4_handle_dirty_metadata+0x404/0x900 [ 2311.383816][ T6977] ? ext4_reserve_inode_write+0x19c/0x220 [ 2311.389517][ T6977] ? ext4_mark_inode_dirty+0x5b0/0x730 [ 2311.394958][ T6977] ? ext4_handle_dirty_dirblock+0x363/0x6e0 [ 2311.400835][ T6977] ? ext4_dirblock_csum_verify+0x6e0/0x6e0 [ 2311.406625][ T6977] ? ext4_append+0x21c/0x2d0 [ 2311.411195][ T6977] ? ext4_mkdir+0xad3/0x1530 [ 2311.415763][ T6977] ext4_mkdir+0xd3f/0x1530 [ 2311.420181][ T6977] ? ext4_symlink+0x1020/0x1020 [ 2311.425012][ T6977] ? filename_create+0x47b/0x6f0 [ 2311.429932][ T6977] ? security_inode_mkdir+0xed/0x130 [ 2311.435200][ T6977] vfs_mkdir+0x420/0x5f0 [ 2311.439426][ T6977] do_mkdirat+0x1e0/0x320 [ 2311.443742][ T6977] ? vfs_mkdir+0x5f0/0x5f0 [ 2311.448139][ T6977] do_syscall_64+0xcb/0x150 [ 2311.452626][ T6977] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2311.458503][ T6977] RIP: 0033:0x45d277 [ 2311.462382][ T6977] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2311.481970][ T6977] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2311.490383][ T6977] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 18:55:31 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000016d000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2311.498335][ T6977] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2311.506288][ T6977] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2311.514236][ T6977] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2311.522193][ T6977] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2311.555217][ T6990] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2311.567057][ T6990] EXT4-fs (loop3): get root inode failed [ 2311.573855][ T6990] EXT4-fs (loop3): mount failed [ 2311.634492][ T6977] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2311.695638][ T6990] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2311.698537][ T6991] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2311.708119][ T6990] EXT4-fs (loop3): get root inode failed [ 2311.724925][ T6990] EXT4-fs (loop3): mount failed 18:55:31 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x4c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:31 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000074000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:31 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000404c0000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:31 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x7a000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffffff7f) 18:55:31 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000179000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:31 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000007a000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:31 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02f467207d000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:31 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000286000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:31 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02ffffff8c000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:31 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000292000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2312.047027][ T7019] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2312.073878][ T7019] EXT4-fs (loop3): get root inode failed [ 2312.081460][ T7036] FAULT_INJECTION: forcing a failure. [ 2312.081460][ T7036] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.088379][ T7019] EXT4-fs (loop3): mount failed [ 2312.095319][ T7036] CPU: 0 PID: 7036 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2312.109042][ T7036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.119080][ T7036] Call Trace: [ 2312.122370][ T7036] dump_stack+0x1b0/0x21e [ 2312.126691][ T7036] ? devkmsg_release+0x11c/0x11c [ 2312.131606][ T7036] ? _raw_spin_lock+0xa1/0x170 [ 2312.136348][ T7036] ? show_regs_print_info+0x12/0x12 [ 2312.141527][ T7036] should_fail+0x6fb/0x860 [ 2312.145929][ T7036] ? setup_fault_attr+0x2b0/0x2b0 [ 2312.150937][ T7036] ? vfs_submount+0xb0/0xb0 [ 2312.155419][ T7036] ? retain_dentry+0x275/0x360 [ 2312.160173][ T7036] ? ksys_mount+0x30/0xf0 [ 2312.164479][ T7036] should_failslab+0x5/0x20 [ 2312.168962][ T7036] __kmalloc_track_caller+0x5d/0x2b0 [ 2312.174224][ T7036] ? strnlen_user+0x185/0x210 [ 2312.178875][ T7036] strndup_user+0x73/0x150 [ 2312.183292][ T7036] ksys_mount+0x30/0xf0 [ 2312.187432][ T7036] __x64_sys_mount+0xb1/0xc0 [ 2312.192004][ T7036] do_syscall_64+0xcb/0x150 [ 2312.196499][ T7036] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2312.202400][ T7036] RIP: 0033:0x4608aa [ 2312.206286][ T7036] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2312.225899][ T7036] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2312.234299][ T7036] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2312.242251][ T7036] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2312.250203][ T7036] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2312.258155][ T7036] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2312.266109][ T7036] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2312.277499][ T7037] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2312.401649][ T7019] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2312.413744][ T7019] EXT4-fs (loop3): get root inode failed [ 2312.419464][ T7019] EXT4-fs (loop3): mount failed 18:55:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x60, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:32 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02ffffff97000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:32 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040600000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x7d2067f4, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:32 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffffffa1) 18:55:32 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040680000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:32 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000029e000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:32 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000edc0000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x80040000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:32 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000406c0000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2312.600127][ T7054] FAULT_INJECTION: forcing a failure. [ 2312.600127][ T7054] name failslab, interval 1, probability 0, space 0, times 0 [ 2312.629874][ T7058] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2312.630511][ T7054] CPU: 1 PID: 7054 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2312.643490][ T7056] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2312.651394][ T7054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2312.651397][ T7054] Call Trace: [ 2312.651415][ T7054] dump_stack+0x1b0/0x21e [ 2312.651430][ T7054] ? devkmsg_release+0x11c/0x11c [ 2312.675283][ T7058] EXT4-fs (loop3): get root inode failed [ 2312.677875][ T7054] ? show_regs_print_info+0x12/0x12 [ 2312.677888][ T7054] ? _raw_spin_unlock+0x5/0x20 18:55:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffffffe4) [ 2312.698333][ T7054] ? ttwu_queue+0x243/0x380 [ 2312.702821][ T7054] should_fail+0x6fb/0x860 [ 2312.707131][ T7058] EXT4-fs (loop3): mount failed [ 2312.707229][ T7054] ? setup_fault_attr+0x2b0/0x2b0 [ 2312.717058][ T7054] ? __rcu_read_lock+0x50/0x50 [ 2312.721816][ T7054] ? mempool_alloc_slab+0x16/0x30 [ 2312.726824][ T7054] ? mempool_free+0x380/0x380 [ 2312.731476][ T7054] should_failslab+0x5/0x20 [ 2312.735953][ T7054] kmem_cache_alloc+0x36/0x250 [ 2312.740715][ T7054] ? mempool_free+0x380/0x380 [ 2312.745361][ T7054] mempool_alloc_slab+0x16/0x30 [ 2312.750212][ T7054] mempool_alloc+0x100/0x650 [ 2312.754791][ T7054] ? write_boundary_block+0x150/0x150 [ 2312.760129][ T7054] ? mempool_resize+0x910/0x910 [ 2312.764957][ T7054] ? page_cache_prev_miss+0x3e0/0x3e0 [ 2312.770298][ T7054] ? __rcu_read_lock+0x50/0x50 [ 2312.775056][ T7054] ? mark_buffer_dirty+0x334/0x380 [ 2312.780134][ T7054] bio_alloc_bioset+0x1fc/0x660 [ 2312.784977][ T7054] ? bio_chain_endio+0xf0/0xf0 [ 2312.789709][ T7054] ? __ext4_get_inode_loc+0x499/0x1030 [ 2312.795150][ T7054] ? fscrypt_match_name+0x131/0x440 [ 2312.800317][ T7054] submit_bh_wbc+0x1ba/0x790 [ 2312.804874][ T7054] ? lock_page_memcg+0x6e/0x140 [ 2312.809693][ T7054] ? mark_buffer_dirty+0x343/0x380 [ 2312.814773][ T7054] __sync_dirty_buffer+0x1d2/0x2d0 [ 2312.819857][ T7054] __ext4_handle_dirty_metadata+0x184/0x900 [ 2312.825719][ T7054] ? __ext4_journal_get_create_access+0x300/0x300 [ 2312.832101][ T7054] ? ext4_mark_inode_dirty+0x5b0/0x730 [ 2312.837541][ T7054] ext4_handle_dirty_dirblock+0x363/0x6e0 [ 2312.843229][ T7054] ? ext4_dirblock_csum_verify+0x6e0/0x6e0 [ 2312.849003][ T7054] ? memcpy+0x38/0x50 [ 2312.852953][ T7054] ? add_dirent_to_buf+0x430/0x6e0 [ 2312.858047][ T7054] add_dirent_to_buf+0x5a4/0x6e0 [ 2312.862954][ T7054] ? ext4_add_entry+0x42a0/0x42a0 [ 2312.867945][ T7054] ? __ext4_read_dirblock+0x4d8/0xda0 [ 2312.873285][ T7054] ext4_add_entry+0x26a6/0x42a0 [ 2312.878219][ T7054] ? __ext4_journal_get_create_access+0x251/0x300 [ 2312.884607][ T7054] ? __ext4_get_inode_loc+0x499/0x1030 [ 2312.890038][ T7054] ? ext4_mark_iloc_dirty+0x245f/0x3400 [ 2312.895554][ T7054] ? ext4_dx_csum+0x5e0/0x5e0 [ 2312.900201][ T7054] ? ext4_chunk_trans_blocks+0x280/0x280 [ 2312.905801][ T7054] ? __ext4_handle_dirty_metadata+0x404/0x900 [ 2312.911836][ T7054] ? ext4_reserve_inode_write+0x19c/0x220 [ 2312.917524][ T7054] ? ext4_mark_inode_dirty+0x5b0/0x730 [ 2312.922970][ T7054] ? ext4_handle_dirty_dirblock+0x363/0x6e0 [ 2312.928838][ T7054] ? ext4_dirblock_csum_verify+0x6e0/0x6e0 [ 2312.934613][ T7054] ? ext4_append+0x21c/0x2d0 [ 2312.939184][ T7054] ? ext4_mkdir+0xad3/0x1530 [ 2312.943743][ T7054] ext4_mkdir+0xd3f/0x1530 [ 2312.948148][ T7054] ? ext4_symlink+0x1020/0x1020 [ 2312.952972][ T7054] ? filename_create+0x47b/0x6f0 [ 2312.957879][ T7054] ? security_inode_mkdir+0xed/0x130 [ 2312.963133][ T7054] vfs_mkdir+0x420/0x5f0 [ 2312.967351][ T7054] do_mkdirat+0x1e0/0x320 [ 2312.971652][ T7054] ? vfs_mkdir+0x5f0/0x5f0 [ 2312.976044][ T7054] do_syscall_64+0xcb/0x150 [ 2312.980520][ T7054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2312.986380][ T7054] RIP: 0033:0x45d277 [ 2312.990242][ T7054] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 dd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 bd bf fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2313.009818][ T7054] RSP: 002b:00007f415c78ba88 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 2313.018199][ T7054] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 000000000045d277 [ 2313.026180][ T7054] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 2313.034134][ T7054] RBP: 00007f415c78bae0 R08: 0000000020000290 R09: 0000000000000000 [ 2313.042075][ T7054] R10: 0000000000022100 R11: 0000000000000213 R12: 0000000020000000 [ 2313.050034][ T7054] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2313.088671][ T7054] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2313.181008][ T7058] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2313.192846][ T7058] EXT4-fs (loop3): get root inode failed [ 2313.199271][ T7058] EXT4-fs (loop3): mount failed 18:55:32 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x68, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:32 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e027d2067f4000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:32 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040740000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:32 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x8cffffff, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:32 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02fffffff6000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:32 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000003f7000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2313.283956][ T7083] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2313.318994][ T7094] FAULT_INJECTION: forcing a failure. [ 2313.318994][ T7094] name failslab, interval 1, probability 0, space 0, times 0 18:55:32 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02fffffdf9000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:32 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02fffffdfd000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2313.332103][ T7094] CPU: 0 PID: 7094 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2313.342149][ T7094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2313.352179][ T7094] Call Trace: [ 2313.355462][ T7094] dump_stack+0x1b0/0x21e [ 2313.359774][ T7094] ? devkmsg_release+0x11c/0x11c [ 2313.364695][ T7094] ? show_regs_print_info+0x12/0x12 [ 2313.369944][ T7094] ? _raw_spin_lock+0xa1/0x170 [ 2313.374701][ T7094] ? _raw_spin_trylock_bh+0x190/0x190 [ 2313.380077][ T7094] should_fail+0x6fb/0x860 [ 2313.384465][ T7094] ? setup_fault_attr+0x2b0/0x2b0 [ 2313.389460][ T7094] ? up_write+0xa1/0x190 [ 2313.393675][ T7094] ? setup_fault_attr+0x2b0/0x2b0 [ 2313.398670][ T7094] ? vfs_submount+0xb0/0xb0 [ 2313.403149][ T7094] ? retain_dentry+0x275/0x360 [ 2313.407896][ T7094] ? copy_mount_options+0x59/0x320 [ 2313.413027][ T7094] should_failslab+0x5/0x20 [ 2313.417503][ T7094] kmem_cache_alloc_trace+0x39/0x270 [ 2313.423282][ T7094] copy_mount_options+0x59/0x320 [ 2313.428205][ T7094] ? ksys_mount+0x8f/0xf0 [ 2313.432503][ T7094] ksys_mount+0x97/0xf0 [ 2313.436629][ T7094] __x64_sys_mount+0xb1/0xc0 [ 2313.441280][ T7094] do_syscall_64+0xcb/0x150 [ 2313.445752][ T7094] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2313.451628][ T7094] RIP: 0033:0x4608aa [ 2313.455505][ T7094] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2313.475131][ T7094] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02fffffffd000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xfffffff6) [ 2313.483625][ T7094] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2313.491564][ T7094] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2313.499503][ T7094] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2313.507448][ T7094] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2313.515389][ T7094] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000001fe000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x94000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x6c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2313.555041][ T7095] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2313.566952][ T7095] EXT4-fs (loop3): get root inode failed [ 2313.573347][ T7095] EXT4-fs (loop3): mount failed 18:55:33 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000407a0000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000fff000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02f9fdffff000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02fdfdffff000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x97ffffff, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e027fffffff000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e028cffffff000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2313.683541][ T7119] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2313.695378][ T7119] EXT4-fs (loop3): get root inode failed [ 2313.701044][ T7119] EXT4-fs (loop3): mount failed [ 2313.773712][ T7131] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2313.783522][ T7119] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2313.795578][ T7127] FAULT_INJECTION: forcing a failure. [ 2313.795578][ T7127] name failslab, interval 1, probability 0, space 0, times 0 [ 2313.810123][ T7119] EXT4-fs (loop3): get root inode failed [ 2313.821118][ T7127] CPU: 1 PID: 7127 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2313.831179][ T7127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2313.841227][ T7127] Call Trace: [ 2313.844516][ T7127] dump_stack+0x1b0/0x21e [ 2313.848857][ T7127] ? devkmsg_release+0x11c/0x11c [ 2313.853805][ T7127] ? show_regs_print_info+0x12/0x12 [ 2313.858991][ T7127] ? _raw_spin_lock+0xa1/0x170 [ 2313.863748][ T7127] ? _raw_spin_trylock_bh+0x190/0x190 [ 2313.869116][ T7119] EXT4-fs (loop3): mount failed [ 2313.869129][ T7127] should_fail+0x6fb/0x860 [ 2313.869173][ T7127] ? setup_fault_attr+0x2b0/0x2b0 [ 2313.883405][ T7127] ? up_write+0xa1/0x190 [ 2313.887652][ T7127] ? setup_fault_attr+0x2b0/0x2b0 [ 2313.892697][ T7127] ? vfs_submount+0xb0/0xb0 [ 2313.897179][ T7127] ? retain_dentry+0x275/0x360 [ 2313.901910][ T7127] ? copy_mount_options+0x59/0x320 [ 2313.907004][ T7127] should_failslab+0x5/0x20 [ 2313.911474][ T7127] kmem_cache_alloc_trace+0x39/0x270 [ 2313.916725][ T7127] copy_mount_options+0x59/0x320 [ 2313.921636][ T7127] ? ksys_mount+0x8f/0xf0 [ 2313.925945][ T7127] ksys_mount+0x97/0xf0 [ 2313.930080][ T7127] __x64_sys_mount+0xb1/0xc0 [ 2313.934651][ T7127] do_syscall_64+0xcb/0x150 [ 2313.939133][ T7127] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2313.944998][ T7127] RIP: 0033:0x4608aa [ 2313.948869][ T7127] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 18:55:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xfffffffe) 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0297ffffff000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040940000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x74, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02f6ffffff000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2313.968444][ T7127] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2313.976827][ T7127] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2313.984813][ T7127] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2313.992759][ T7127] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2314.000702][ T7127] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2314.008644][ T7127] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:33 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02fdffffff000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x98000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:33 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040950000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2314.165801][ T7162] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2314.180424][ T7162] EXT4-fs (loop3): get root inode failed [ 2314.188843][ T7162] EXT4-fs (loop3): mount failed 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200020000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200030000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2314.216870][ T7164] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:33 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200040000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2314.257654][ T7173] FAULT_INJECTION: forcing a failure. [ 2314.257654][ T7173] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.270456][ T7173] CPU: 0 PID: 7173 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2314.280619][ T7173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2314.290645][ T7173] Call Trace: [ 2314.293910][ T7173] dump_stack+0x1b0/0x21e [ 2314.298218][ T7173] ? devkmsg_release+0x11c/0x11c [ 2314.303137][ T7173] ? avc_has_perm+0x15f/0x260 [ 2314.307790][ T7173] ? show_regs_print_info+0x12/0x12 [ 2314.312961][ T7173] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 2314.318303][ T7173] ? filename_lookup+0x4e6/0x6c0 [ 2314.323212][ T7173] should_fail+0x6fb/0x860 [ 2314.327600][ T7173] ? setup_fault_attr+0x2b0/0x2b0 [ 2314.332600][ T7173] ? selinux_mount+0x3e6/0x550 [ 2314.337337][ T7173] ? alloc_fs_context+0x61/0x650 [ 2314.342243][ T7173] should_failslab+0x5/0x20 [ 2314.346717][ T7173] kmem_cache_alloc_trace+0x39/0x270 [ 2314.351981][ T7173] alloc_fs_context+0x61/0x650 [ 2314.356745][ T7173] ? _raw_read_unlock+0xe/0x30 [ 2314.361494][ T7173] ? get_fs_type+0x410/0x490 [ 2314.366068][ T7173] do_mount+0x12a4/0x2630 [ 2314.370383][ T7173] ? _raw_spin_unlock+0x5/0x20 [ 2314.375117][ T7173] ? ___slab_alloc+0x297/0x450 [ 2314.379849][ T7173] ? copy_mount_string+0x30/0x30 [ 2314.384757][ T7173] ? copy_mount_options+0x59/0x320 [ 2314.389856][ T7173] ? copy_mount_options+0x293/0x320 [ 2314.395026][ T7173] ksys_mount+0xc2/0xf0 [ 2314.399176][ T7173] __x64_sys_mount+0xb1/0xc0 [ 2314.403761][ T7173] do_syscall_64+0xcb/0x150 [ 2314.408237][ T7173] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2314.414114][ T7173] RIP: 0033:0x4608aa [ 2314.417977][ T7173] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2314.437570][ T7173] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2314.445971][ T7173] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa 18:55:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x1000000000000) 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200050000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200060000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2314.453932][ T7173] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2314.461925][ T7173] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2314.469869][ T7173] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2314.477821][ T7173] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x7a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200070000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:34 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040980000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x99000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:34 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2314.632758][ T7162] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2314.647666][ T7162] EXT4-fs (loop3): get root inode failed [ 2314.657659][ T7162] EXT4-fs (loop3): mount failed 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200080000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200090000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000a0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2314.722862][ T7193] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xa000000000000) 18:55:34 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040040200000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000b0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2314.780216][ T7205] FAULT_INJECTION: forcing a failure. [ 2314.780216][ T7205] name failslab, interval 1, probability 0, space 0, times 0 [ 2314.796364][ T7205] CPU: 0 PID: 7205 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2314.806410][ T7205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2314.816458][ T7205] Call Trace: [ 2314.819744][ T7205] dump_stack+0x1b0/0x21e [ 2314.824067][ T7205] ? devkmsg_release+0x11c/0x11c 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000c0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2314.828996][ T7205] ? show_regs_print_info+0x12/0x12 [ 2314.834190][ T7205] ? avc_has_perm+0x15f/0x260 [ 2314.838973][ T7205] should_fail+0x6fb/0x860 [ 2314.843376][ T7205] ? setup_fault_attr+0x2b0/0x2b0 [ 2314.848381][ T7205] ? setup_fault_attr+0x2b0/0x2b0 [ 2314.853389][ T7205] ? selinux_mount+0x3e6/0x550 [ 2314.858137][ T7205] ? legacy_init_fs_context+0x4d/0xc0 [ 2314.863492][ T7205] should_failslab+0x5/0x20 [ 2314.867978][ T7205] kmem_cache_alloc_trace+0x39/0x270 [ 2314.873248][ T7205] legacy_init_fs_context+0x4d/0xc0 [ 2314.878432][ T7205] alloc_fs_context+0x50c/0x650 [ 2314.883261][ T7205] do_mount+0x12a4/0x2630 [ 2314.887564][ T7205] ? _raw_spin_unlock+0x5/0x20 [ 2314.892314][ T7205] ? ___slab_alloc+0x297/0x450 [ 2314.897048][ T7205] ? copy_mount_string+0x30/0x30 [ 2314.901956][ T7205] ? copy_mount_options+0x59/0x320 [ 2314.907056][ T7205] ? copy_mount_options+0x293/0x320 [ 2314.912241][ T7205] ksys_mount+0xc2/0xf0 [ 2314.916368][ T7205] __x64_sys_mount+0xb1/0xc0 [ 2314.920947][ T7205] do_syscall_64+0xcb/0x150 [ 2314.925431][ T7205] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2314.931303][ T7205] RIP: 0033:0x4608aa [ 2314.935186][ T7205] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2314.954766][ T7205] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2314.963166][ T7205] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2314.971115][ T7205] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2314.979069][ T7205] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2314.987012][ T7205] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2314.994953][ T7205] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2315.069762][ T7217] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2315.081519][ T7217] EXT4-fs (loop3): get root inode failed [ 2315.087355][ T7217] EXT4-fs (loop3): mount failed 18:55:34 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x94, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:34 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000d0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x9c000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:34 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:34 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000e0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x100000000000000) [ 2315.188628][ T7230] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2315.220597][ T7238] FAULT_INJECTION: forcing a failure. [ 2315.220597][ T7238] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.233397][ T7238] CPU: 0 PID: 7238 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2315.243449][ T7238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.253500][ T7238] Call Trace: [ 2315.256795][ T7238] dump_stack+0x1b0/0x21e [ 2315.261105][ T7238] ? devkmsg_release+0x11c/0x11c [ 2315.266041][ T7238] ? show_regs_print_info+0x12/0x12 [ 2315.271216][ T7238] ? avc_has_perm+0x15f/0x260 [ 2315.275894][ T7238] should_fail+0x6fb/0x860 [ 2315.280293][ T7238] ? setup_fault_attr+0x2b0/0x2b0 [ 2315.285302][ T7238] ? setup_fault_attr+0x2b0/0x2b0 [ 2315.290305][ T7238] ? selinux_mount+0x3e6/0x550 [ 2315.295061][ T7238] ? legacy_init_fs_context+0x4d/0xc0 [ 2315.300452][ T7238] should_failslab+0x5/0x20 [ 2315.304943][ T7238] kmem_cache_alloc_trace+0x39/0x270 [ 2315.310213][ T7238] legacy_init_fs_context+0x4d/0xc0 [ 2315.315413][ T7238] alloc_fs_context+0x50c/0x650 [ 2315.320248][ T7238] do_mount+0x12a4/0x2630 [ 2315.324558][ T7238] ? up_write+0xa1/0x190 [ 2315.328782][ T7238] ? copy_mount_string+0x30/0x30 [ 2315.333700][ T7238] ? copy_mount_options+0x1f8/0x320 [ 2315.338874][ T7238] ? copy_mount_options+0x230/0x320 [ 2315.344056][ T7238] ? __sanitizer_cov_trace_const_cmp2+0x90/0x90 [ 2315.350281][ T7238] ? copy_mount_options+0x293/0x320 [ 2315.355465][ T7238] ksys_mount+0xc2/0xf0 [ 2315.359604][ T7238] __x64_sys_mount+0xb1/0xc0 [ 2315.364225][ T7238] do_syscall_64+0xcb/0x150 [ 2315.368726][ T7238] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2315.374635][ T7238] RIP: 0033:0x4608aa [ 2315.378512][ T7238] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2315.398096][ T7238] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2315.406488][ T7238] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2315.414453][ T7238] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2315.422407][ T7238] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2315.430373][ T7238] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200100000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200110000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x9d000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200120000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200180000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2315.438333][ T7238] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2315.580087][ T7246] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2315.598237][ T7246] EXT4-fs (loop3): get root inode failed [ 2315.607625][ T7246] EXT4-fs (loop3): mount failed 18:55:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x95, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200220000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040670300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xc0ed0000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2315.659523][ T7246] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2315.668595][ T7261] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2315.671178][ T7246] EXT4-fs (loop3): get root inode failed [ 2315.686227][ T7246] EXT4-fs (loop3): mount failed 18:55:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x200000000000000) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200250000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200480000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02004c0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200600000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200680000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02006c0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2315.842893][ T7277] FAULT_INJECTION: forcing a failure. [ 2315.842893][ T7277] name failslab, interval 1, probability 0, space 0, times 0 [ 2315.885085][ T7277] CPU: 0 PID: 7277 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2315.886266][ T7278] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2315.895166][ T7277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2315.895170][ T7277] Call Trace: [ 2315.895192][ T7277] dump_stack+0x1b0/0x21e [ 2315.895203][ T7277] ? devkmsg_release+0x11c/0x11c [ 2315.895212][ T7277] ? show_regs_print_info+0x12/0x12 [ 2315.895222][ T7277] ? avc_has_perm+0x15f/0x260 [ 2315.895236][ T7277] should_fail+0x6fb/0x860 [ 2315.895247][ T7277] ? setup_fault_attr+0x2b0/0x2b0 [ 2315.895255][ T7277] ? setup_fault_attr+0x2b0/0x2b0 [ 2315.895264][ T7277] ? selinux_mount+0x3e6/0x550 [ 2315.895273][ T7277] ? legacy_init_fs_context+0x4d/0xc0 [ 2315.895282][ T7277] should_failslab+0x5/0x20 [ 2315.895290][ T7277] kmem_cache_alloc_trace+0x39/0x270 [ 2315.895300][ T7277] legacy_init_fs_context+0x4d/0xc0 [ 2315.895317][ T7277] alloc_fs_context+0x50c/0x650 [ 2315.983299][ T7277] do_mount+0x12a4/0x2630 [ 2315.987614][ T7277] ? setup_fault_attr+0x2b0/0x2b0 [ 2315.992618][ T7277] ? up_write+0xa1/0x190 [ 2315.996841][ T7277] ? ___slab_alloc+0x9b/0x450 [ 2316.001499][ T7277] ? copy_mount_string+0x30/0x30 [ 2316.006423][ T7277] ? retain_dentry+0x275/0x360 [ 2316.011180][ T7277] ? copy_mount_options+0x59/0x320 [ 2316.016281][ T7277] ? copy_mount_options+0x293/0x320 [ 2316.021465][ T7277] ksys_mount+0xc2/0xf0 [ 2316.025612][ T7277] __x64_sys_mount+0xb1/0xc0 [ 2316.030185][ T7277] do_syscall_64+0xcb/0x150 [ 2316.034690][ T7277] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2316.040566][ T7277] RIP: 0033:0x4608aa [ 2316.044443][ T7277] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2316.064030][ T7277] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2316.072423][ T7277] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2316.080385][ T7277] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2316.088345][ T7277] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2316.096297][ T7277] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2316.104333][ T7277] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2316.124139][ T7278] EXT4-fs (loop3): get root inode failed [ 2316.130524][ T7278] EXT4-fs (loop3): mount failed 18:55:35 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x98, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:35 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000406a0300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xf0ffffff, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200740000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x204000000000000) 18:55:35 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02007a0000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2316.269217][ T7278] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2316.281026][ T7278] EXT4-fs (loop3): get root inode failed [ 2316.286756][ T7278] EXT4-fs (loop3): mount failed 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200610100000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02006d0100000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200790100000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2316.353349][ T7315] FAULT_INJECTION: forcing a failure. [ 2316.353349][ T7315] name failslab, interval 1, probability 0, space 0, times 0 [ 2316.367015][ T7315] CPU: 0 PID: 7315 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2316.377063][ T7315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.387110][ T7315] Call Trace: [ 2316.390396][ T7315] dump_stack+0x1b0/0x21e [ 2316.394712][ T7315] ? devkmsg_release+0x11c/0x11c 18:55:35 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200fe0100000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:36 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200860200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2316.399637][ T7315] ? show_regs_print_info+0x12/0x12 [ 2316.404822][ T7315] ? _atomic_dec_and_lock+0x1e9/0x2c0 [ 2316.410173][ T7315] ? cpumask_local_spread+0x3a0/0x3a0 [ 2316.415516][ T7315] ? _raw_spin_lock+0xa1/0x170 [ 2316.420264][ T7315] should_fail+0x6fb/0x860 [ 2316.424699][ T7315] ? setup_fault_attr+0x2b0/0x2b0 [ 2316.429714][ T7315] ? alloc_super+0x56/0x760 [ 2316.434201][ T7315] should_failslab+0x5/0x20 [ 2316.438700][ T7315] kmem_cache_alloc_trace+0x39/0x270 [ 2316.443981][ T7315] ? _raw_spin_trylock_bh+0x190/0x190 [ 2316.449343][ T7315] ? bdev_read_only+0x21/0x80 [ 2316.454011][ T7315] ? mount_bdev+0x340/0x340 [ 2316.458505][ T7315] alloc_super+0x56/0x760 [ 2316.462825][ T7315] ? mount_bdev+0x340/0x340 [ 2316.467310][ T7315] sget+0x20e/0x4e0 [ 2316.471086][ T7315] ? test_bdev_super+0x40/0x40 [ 2316.475826][ T7315] mount_bdev+0xe3/0x340 [ 2316.480082][ T7315] ? ext4_mount+0x40/0x40 [ 2316.484393][ T7315] legacy_get_tree+0xde/0x170 [ 2316.489047][ T7315] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2316.494389][ T7315] vfs_get_tree+0x85/0x260 [ 2316.498784][ T7315] do_mount+0x1883/0x2630 [ 2316.503086][ T7315] ? setup_fault_attr+0x2b0/0x2b0 [ 2316.508076][ T7315] ? up_write+0xa1/0x190 [ 2316.512289][ T7315] ? ___slab_alloc+0x9b/0x450 [ 2316.516943][ T7315] ? copy_mount_string+0x30/0x30 [ 2316.521850][ T7315] ? retain_dentry+0x275/0x360 [ 2316.526589][ T7315] ? copy_mount_options+0x59/0x320 [ 2316.531678][ T7315] ? copy_mount_options+0x293/0x320 [ 2316.536848][ T7315] ksys_mount+0xc2/0xf0 [ 2316.540976][ T7315] __x64_sys_mount+0xb1/0xc0 [ 2316.545537][ T7315] do_syscall_64+0xcb/0x150 [ 2316.550011][ T7315] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2316.555872][ T7315] RIP: 0033:0x4608aa [ 2316.559736][ T7315] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2316.579316][ T7315] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2316.587699][ T7315] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2316.595641][ T7315] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2316.603599][ T7315] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2316.611574][ T7315] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2316.619528][ T7315] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2316.657111][ T7313] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2316.668980][ T7327] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2316.681374][ T7327] EXT4-fs (loop3): get root inode failed [ 2316.692874][ T7327] EXT4-fs (loop3): mount failed [ 2316.768389][ T7327] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2316.780058][ T7327] EXT4-fs (loop3): get root inode failed [ 2316.785735][ T7327] EXT4-fs (loop3): mount failed 18:55:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x99, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:36 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200920200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xf467207d, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:36 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000406b0300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:36 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x300000000000000) 18:55:36 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040fa0300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:36 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02009e0200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xf6ffffff, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2316.903981][ T7355] FAULT_INJECTION: forcing a failure. [ 2316.903981][ T7355] name failslab, interval 1, probability 0, space 0, times 0 [ 2316.923961][ T7355] CPU: 0 PID: 7355 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2316.934035][ T7355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2316.944079][ T7355] Call Trace: [ 2316.947364][ T7355] dump_stack+0x1b0/0x21e [ 2316.951675][ T7355] ? devkmsg_release+0x11c/0x11c [ 2316.956621][ T7355] ? show_regs_print_info+0x12/0x12 [ 2316.961797][ T7355] ? __blkdev_get+0x119e/0x1a10 [ 2316.966629][ T7355] should_fail+0x6fb/0x860 [ 2316.971025][ T7355] ? setup_fault_attr+0x2b0/0x2b0 [ 2316.976031][ T7355] ? should_fail+0x182/0x860 [ 2316.980604][ T7355] ? setup_fault_attr+0x2b0/0x2b0 [ 2316.985611][ T7355] ? selinux_sb_alloc_security+0x4f/0x200 [ 2316.991324][ T7355] should_failslab+0x5/0x20 [ 2316.995808][ T7355] kmem_cache_alloc_trace+0x39/0x270 [ 2317.001089][ T7355] ? down_write+0xd8/0x150 [ 2317.005488][ T7355] selinux_sb_alloc_security+0x4f/0x200 [ 2317.011027][ T7355] security_sb_alloc+0x50/0xb0 [ 2317.015770][ T7355] alloc_super+0x140/0x760 [ 2317.020170][ T7355] ? mount_bdev+0x340/0x340 [ 2317.024650][ T7355] sget+0x20e/0x4e0 [ 2317.028436][ T7355] ? test_bdev_super+0x40/0x40 [ 2317.033182][ T7355] mount_bdev+0xe3/0x340 [ 2317.037423][ T7355] ? ext4_mount+0x40/0x40 [ 2317.041729][ T7355] legacy_get_tree+0xde/0x170 [ 2317.046384][ T7355] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2317.051737][ T7355] vfs_get_tree+0x85/0x260 [ 2317.056133][ T7355] do_mount+0x1883/0x2630 [ 2317.060444][ T7355] ? _raw_spin_unlock+0x5/0x20 [ 2317.065204][ T7355] ? ___slab_alloc+0x297/0x450 [ 2317.069944][ T7355] ? copy_mount_string+0x30/0x30 [ 2317.074888][ T7355] ? copy_mount_options+0x59/0x320 [ 2317.079984][ T7355] ? copy_mount_options+0x293/0x320 [ 2317.085179][ T7355] ksys_mount+0xc2/0xf0 [ 2317.089318][ T7355] __x64_sys_mount+0xb1/0xc0 [ 2317.093886][ T7355] do_syscall_64+0xcb/0x150 [ 2317.098367][ T7355] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2317.104237][ T7355] RIP: 0033:0x4608aa [ 2317.108119][ T7355] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2317.127810][ T7355] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2317.136206][ T7355] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2317.144159][ T7355] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 18:55:36 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:36 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040fb0300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x400000000000000) [ 2317.152125][ T7355] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2317.160076][ T7355] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2317.168025][ T7355] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2317.180001][ T7352] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2317.229578][ T7363] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2317.244645][ T7363] EXT4-fs (loop3): get root inode failed [ 2317.250504][ T7363] EXT4-fs (loop3): mount failed 18:55:36 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x9c, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:36 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000300000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xf9fdffff, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:36 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040fc0300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2317.328944][ T7377] FAULT_INJECTION: forcing a failure. [ 2317.328944][ T7377] name failslab, interval 1, probability 0, space 0, times 0 [ 2317.352292][ T7377] CPU: 1 PID: 7377 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2317.362452][ T7377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2317.372485][ T7377] Call Trace: [ 2317.375787][ T7377] dump_stack+0x1b0/0x21e [ 2317.380084][ T7377] ? devkmsg_release+0x11c/0x11c [ 2317.384990][ T7377] ? show_regs_print_info+0x12/0x12 [ 2317.390199][ T7377] ? __blkdev_get+0x119e/0x1a10 [ 2317.395027][ T7377] should_fail+0x6fb/0x860 [ 2317.399431][ T7377] ? setup_fault_attr+0x2b0/0x2b0 [ 2317.404427][ T7377] ? should_fail+0x182/0x860 [ 2317.408985][ T7377] ? setup_fault_attr+0x2b0/0x2b0 [ 2317.413993][ T7377] ? selinux_sb_alloc_security+0x4f/0x200 [ 2317.419682][ T7377] should_failslab+0x5/0x20 [ 2317.424159][ T7377] kmem_cache_alloc_trace+0x39/0x270 [ 2317.429417][ T7377] ? down_write+0xd8/0x150 [ 2317.433803][ T7377] selinux_sb_alloc_security+0x4f/0x200 [ 2317.439319][ T7377] security_sb_alloc+0x50/0xb0 [ 2317.444050][ T7377] alloc_super+0x140/0x760 [ 2317.448436][ T7377] ? mount_bdev+0x340/0x340 [ 2317.452915][ T7377] sget+0x20e/0x4e0 [ 2317.456716][ T7377] ? test_bdev_super+0x40/0x40 [ 2317.461466][ T7377] mount_bdev+0xe3/0x340 [ 2317.465679][ T7377] ? ext4_mount+0x40/0x40 [ 2317.469980][ T7377] legacy_get_tree+0xde/0x170 [ 2317.474624][ T7377] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2317.479966][ T7377] vfs_get_tree+0x85/0x260 [ 2317.484353][ T7377] do_mount+0x1883/0x2630 [ 2317.488651][ T7377] ? setup_fault_attr+0x2b0/0x2b0 [ 2317.493658][ T7377] ? up_write+0xa1/0x190 [ 2317.497872][ T7377] ? ___slab_alloc+0x9b/0x450 [ 2317.502536][ T7377] ? copy_mount_string+0x30/0x30 [ 2317.507445][ T7377] ? retain_dentry+0x275/0x360 [ 2317.512187][ T7377] ? copy_mount_options+0x59/0x320 [ 2317.517277][ T7377] ? copy_mount_options+0x293/0x320 [ 2317.522448][ T7377] ksys_mount+0xc2/0xf0 [ 2317.526575][ T7377] __x64_sys_mount+0xb1/0xc0 [ 2317.531145][ T7377] do_syscall_64+0xcb/0x150 [ 2317.535619][ T7377] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2317.541482][ T7377] RIP: 0033:0x4608aa [ 2317.545348][ T7377] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2317.564924][ T7377] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200f70300000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000b0400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200400400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2317.573327][ T7377] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2317.581274][ T7377] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2317.589218][ T7377] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2317.597166][ T7377] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2317.605108][ T7377] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200410400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200420400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:37 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200430400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2317.797089][ T7389] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2317.814348][ T7404] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2317.818253][ T7389] EXT4-fs (loop3): get root inode failed [ 2317.830960][ T7389] EXT4-fs (loop3): mount failed [ 2317.836834][ T7409] FAULT_INJECTION: forcing a failure. [ 2317.836834][ T7409] name failslab, interval 1, probability 0, space 0, times 0 [ 2317.850670][ T7409] CPU: 0 PID: 7409 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2317.860720][ T7409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2317.870770][ T7409] Call Trace: [ 2317.874057][ T7409] dump_stack+0x1b0/0x21e [ 2317.878425][ T7409] ? devkmsg_release+0x11c/0x11c [ 2317.883346][ T7409] ? show_regs_print_info+0x12/0x12 [ 2317.888516][ T7409] ? pcpu_alloc_area+0x7a2/0x8f0 [ 2317.893428][ T7409] should_fail+0x6fb/0x860 [ 2317.897817][ T7409] ? setup_fault_attr+0x2b0/0x2b0 [ 2317.902817][ T7409] ? find_next_bit+0xd8/0x120 [ 2317.907475][ T7409] ? cpumask_next+0xc/0x20 [ 2317.911864][ T7409] ? pcpu_alloc+0xd17/0x11f0 [ 2317.916423][ T7409] ? prealloc_shrinker+0x50/0x210 [ 2317.921416][ T7409] should_failslab+0x5/0x20 [ 2317.925888][ T7409] kmem_cache_alloc_trace+0x39/0x270 [ 2317.931143][ T7409] prealloc_shrinker+0x50/0x210 [ 2317.935968][ T7409] alloc_super+0x5f2/0x760 [ 2317.940352][ T7409] ? mount_bdev+0x340/0x340 [ 2317.944822][ T7409] sget+0x20e/0x4e0 [ 2317.948604][ T7409] ? test_bdev_super+0x40/0x40 [ 2317.953342][ T7409] mount_bdev+0xe3/0x340 [ 2317.957564][ T7409] ? ext4_mount+0x40/0x40 [ 2317.961884][ T7409] legacy_get_tree+0xde/0x170 [ 2317.966534][ T7409] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2317.971874][ T7409] vfs_get_tree+0x85/0x260 [ 2317.976259][ T7409] do_mount+0x1883/0x2630 [ 2317.980573][ T7409] ? _raw_spin_unlock+0x5/0x20 [ 2317.985322][ T7409] ? ___slab_alloc+0x297/0x450 [ 2317.990059][ T7409] ? copy_mount_string+0x30/0x30 [ 2317.994964][ T7409] ? copy_mount_options+0x59/0x320 [ 2318.000043][ T7409] ? copy_mount_options+0x293/0x320 [ 2318.005282][ T7409] ksys_mount+0xc2/0xf0 [ 2318.009411][ T7409] __x64_sys_mount+0xb1/0xc0 [ 2318.013972][ T7409] do_syscall_64+0xcb/0x150 [ 2318.018446][ T7409] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2318.024306][ T7409] RIP: 0033:0x4608aa [ 2318.028185][ T7409] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 18:55:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x500000000000000) [ 2318.047779][ T7409] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2318.056172][ T7409] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2318.064116][ T7409] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2318.072070][ T7409] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2318.080018][ T7409] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2318.087991][ T7409] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x9d, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200440400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:37 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040fd0300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfdfdffff, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:37 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200450400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2318.237536][ T7389] EXT4-fs: failed to create workqueue [ 2318.247108][ T7389] EXT4-fs (loop3): mount failed 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200460400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200470400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfdffffff, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2318.304418][ T7416] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:37 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040fe0300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:37 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200480400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2318.355053][ T7429] FAULT_INJECTION: forcing a failure. [ 2318.355053][ T7429] name failslab, interval 1, probability 0, space 0, times 0 [ 2318.385716][ T7431] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2318.405418][ T7429] CPU: 1 PID: 7429 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2318.415475][ T7429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2318.425515][ T7429] Call Trace: [ 2318.428802][ T7429] dump_stack+0x1b0/0x21e [ 2318.433137][ T7429] ? devkmsg_release+0x11c/0x11c [ 2318.437731][ T7431] EXT4-fs (loop3): get root inode failed [ 2318.438075][ T7429] ? show_regs_print_info+0x12/0x12 [ 2318.448861][ T7429] ? idr_get_free+0x6de/0x880 18:55:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x600000000000000) [ 2318.450073][ T7431] EXT4-fs (loop3): mount failed [ 2318.453526][ T7429] should_fail+0x6fb/0x860 [ 2318.453536][ T7429] ? setup_fault_attr+0x2b0/0x2b0 [ 2318.453545][ T7429] ? __down_read+0xf1/0x210 [ 2318.453552][ T7429] ? up_write+0xa1/0x190 [ 2318.453561][ T7429] ? __list_lru_init+0xa7/0x570 [ 2318.453573][ T7429] should_failslab+0x5/0x20 [ 2318.485763][ T7429] kmem_cache_alloc_trace+0x39/0x270 [ 2318.491036][ T7429] __list_lru_init+0xa7/0x570 [ 2318.495693][ T7429] ? prealloc_shrinker+0x1cc/0x210 [ 2318.500781][ T7429] alloc_super+0x61e/0x760 [ 2318.505176][ T7429] ? mount_bdev+0x340/0x340 [ 2318.509663][ T7429] sget+0x20e/0x4e0 [ 2318.513449][ T7429] ? test_bdev_super+0x40/0x40 [ 2318.518229][ T7429] mount_bdev+0xe3/0x340 [ 2318.522449][ T7429] ? ext4_mount+0x40/0x40 [ 2318.526758][ T7429] legacy_get_tree+0xde/0x170 [ 2318.531414][ T7429] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2318.536766][ T7429] vfs_get_tree+0x85/0x260 [ 2318.541162][ T7429] do_mount+0x1883/0x2630 [ 2318.545471][ T7429] ? _raw_spin_unlock+0x5/0x20 [ 2318.550211][ T7429] ? ___slab_alloc+0x297/0x450 [ 2318.554955][ T7429] ? copy_mount_string+0x30/0x30 [ 2318.559868][ T7429] ? copy_mount_options+0x59/0x320 [ 2318.564957][ T7429] ? copy_mount_options+0x293/0x320 [ 2318.570131][ T7429] ksys_mount+0xc2/0xf0 [ 2318.574265][ T7429] __x64_sys_mount+0xb1/0xc0 [ 2318.578835][ T7429] do_syscall_64+0xcb/0x150 [ 2318.583319][ T7429] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2318.589189][ T7429] RIP: 0033:0x4608aa [ 2318.593063][ T7429] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2318.612644][ T7429] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2318.621055][ T7429] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2318.629005][ T7429] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2318.636953][ T7429] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2318.644915][ T7429] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2318.652863][ T7429] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2318.872854][ T7431] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2318.884643][ T7431] EXT4-fs (loop3): get root inode failed [ 2318.890323][ T7431] EXT4-fs (loop3): mount failed 18:55:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfeffffff, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:38 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:38 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040020400000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:38 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x110, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:38 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200490400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x604000000000000) 18:55:38 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02004a0400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2318.958726][ T7451] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2319.006435][ T7463] FAULT_INJECTION: forcing a failure. [ 2319.006435][ T7463] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.019540][ T7463] CPU: 1 PID: 7463 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2319.029626][ T7463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2319.039657][ T7463] Call Trace: [ 2319.042928][ T7463] dump_stack+0x1b0/0x21e [ 2319.047229][ T7463] ? devkmsg_release+0x11c/0x11c [ 2319.052136][ T7463] ? show_regs_print_info+0x12/0x12 [ 2319.057305][ T7463] ? idr_get_free+0x6de/0x880 [ 2319.061954][ T7463] should_fail+0x6fb/0x860 [ 2319.066341][ T7463] ? setup_fault_attr+0x2b0/0x2b0 [ 2319.071356][ T7463] ? __down_read+0xf1/0x210 [ 2319.075838][ T7463] ? mutex_lock+0xa6/0x110 [ 2319.080235][ T7463] ? __list_lru_init+0xa7/0x570 [ 2319.085055][ T7463] should_failslab+0x5/0x20 [ 2319.089527][ T7463] kmem_cache_alloc_trace+0x39/0x270 [ 2319.094809][ T7463] __list_lru_init+0xa7/0x570 [ 2319.099466][ T7463] ? prealloc_shrinker+0x1cc/0x210 [ 2319.104551][ T7463] alloc_super+0x64d/0x760 [ 2319.108945][ T7463] ? mount_bdev+0x340/0x340 [ 2319.113414][ T7463] sget+0x20e/0x4e0 [ 2319.117194][ T7463] ? test_bdev_super+0x40/0x40 [ 2319.122708][ T7463] mount_bdev+0xe3/0x340 [ 2319.126927][ T7463] ? ext4_mount+0x40/0x40 [ 2319.131240][ T7463] legacy_get_tree+0xde/0x170 [ 2319.135898][ T7463] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2319.141249][ T7463] vfs_get_tree+0x85/0x260 [ 2319.145658][ T7463] do_mount+0x1883/0x2630 [ 2319.149982][ T7463] ? up_write+0xa1/0x190 [ 2319.154220][ T7463] ? copy_mount_string+0x30/0x30 [ 2319.159128][ T7463] ? copy_mount_options+0x1f8/0x320 [ 2319.164295][ T7463] ? copy_mount_options+0x230/0x320 [ 2319.169463][ T7463] ? __sanitizer_cov_trace_const_cmp4+0x4/0x90 [ 2319.175584][ T7463] ? copy_mount_options+0x293/0x320 [ 2319.180754][ T7463] ksys_mount+0xc2/0xf0 [ 2319.184890][ T7463] __x64_sys_mount+0xb1/0xc0 [ 2319.189461][ T7463] do_syscall_64+0xcb/0x150 [ 2319.193933][ T7463] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2319.199794][ T7463] RIP: 0033:0x4608aa [ 2319.203713][ T7463] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2319.223299][ T7463] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2319.231684][ T7463] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2319.239633][ T7463] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2319.247583][ T7463] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 18:55:38 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040060400000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:38 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02004b0400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2319.255549][ T7463] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2319.263579][ T7463] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:38 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02004c0400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:38 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000500000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:38 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2319.296750][ T7466] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2319.308678][ T7466] EXT4-fs (loop3): get root inode failed [ 2319.315047][ T7466] EXT4-fs (loop3): mount failed 18:55:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x204, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000600000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xff030000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:39 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000405f0400000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x700000000000000) [ 2319.409949][ T7466] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2319.422037][ T7466] EXT4-fs (loop3): get root inode failed [ 2319.425756][ T7485] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2319.428806][ T7466] EXT4-fs (loop3): mount failed 18:55:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000700000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000900000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000a00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000b00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2319.562588][ T7492] FAULT_INJECTION: forcing a failure. [ 2319.562588][ T7492] name failslab, interval 1, probability 0, space 0, times 0 [ 2319.595491][ T7492] CPU: 1 PID: 7492 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2319.605611][ T7492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2319.615649][ T7492] Call Trace: [ 2319.618924][ T7492] dump_stack+0x1b0/0x21e [ 2319.623229][ T7492] ? devkmsg_release+0x11c/0x11c [ 2319.628183][ T7492] ? show_regs_print_info+0x12/0x12 [ 2319.633396][ T7492] should_fail+0x6fb/0x860 [ 2319.637787][ T7492] ? setup_fault_attr+0x2b0/0x2b0 [ 2319.642781][ T7492] ? setup_fault_attr+0x2b0/0x2b0 [ 2319.647782][ T7492] ? ___slab_alloc+0x9b/0x450 [ 2319.652472][ T7492] ? __down_read+0xf1/0x210 [ 2319.656949][ T7492] ? kvmalloc_node+0xc2/0x120 [ 2319.661596][ T7492] should_failslab+0x5/0x20 [ 2319.666071][ T7492] __kmalloc+0x5f/0x2c0 [ 2319.670198][ T7492] kvmalloc_node+0xc2/0x120 [ 2319.674673][ T7492] __list_lru_init+0x1d2/0x570 [ 2319.679422][ T7492] ? prealloc_shrinker+0x1cc/0x210 [ 2319.684514][ T7492] alloc_super+0x64d/0x760 [ 2319.688899][ T7492] ? mount_bdev+0x340/0x340 [ 2319.693370][ T7492] sget+0x20e/0x4e0 [ 2319.697146][ T7492] ? test_bdev_super+0x40/0x40 [ 2319.701892][ T7492] mount_bdev+0xe3/0x340 [ 2319.706104][ T7492] ? ext4_mount+0x40/0x40 [ 2319.710405][ T7492] legacy_get_tree+0xde/0x170 [ 2319.715109][ T7492] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2319.720450][ T7492] vfs_get_tree+0x85/0x260 [ 2319.724839][ T7492] do_mount+0x1883/0x2630 [ 2319.729138][ T7492] ? setup_fault_attr+0x2b0/0x2b0 [ 2319.734132][ T7492] ? up_write+0xa1/0x190 [ 2319.738347][ T7492] ? ___slab_alloc+0x9b/0x450 [ 2319.742994][ T7492] ? copy_mount_string+0x30/0x30 [ 2319.747899][ T7492] ? retain_dentry+0x275/0x360 [ 2319.752658][ T7492] ? copy_mount_options+0x59/0x320 [ 2319.757879][ T7492] ? copy_mount_options+0x293/0x320 [ 2319.763048][ T7492] ksys_mount+0xc2/0xf0 [ 2319.767176][ T7492] __x64_sys_mount+0xb1/0xc0 [ 2319.771746][ T7492] do_syscall_64+0xcb/0x150 [ 2319.776232][ T7492] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2319.782093][ T7492] RIP: 0033:0x4608aa [ 2319.785958][ T7492] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2319.805533][ T7492] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 18:55:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200040b00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000c00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2319.813918][ T7492] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2319.821860][ T7492] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2319.829802][ T7492] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2319.837829][ T7492] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2319.845770][ T7492] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:39 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2319.958152][ T7510] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2319.976468][ T7515] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2319.986488][ T7510] EXT4-fs (loop3): get root inode failed [ 2319.995944][ T7510] EXT4-fs (loop3): mount failed 18:55:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x219, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:39 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040600400000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000d00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xffff1f00, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:39 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x800000000000000) [ 2320.037610][ T7510] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2320.049258][ T7510] EXT4-fs (loop3): get root inode failed [ 2320.055336][ T7510] EXT4-fs (loop3): mount failed [ 2320.073118][ T7527] FAULT_INJECTION: forcing a failure. [ 2320.073118][ T7527] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.092009][ T7527] CPU: 1 PID: 7527 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2320.102082][ T7527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2320.112124][ T7527] Call Trace: [ 2320.115414][ T7527] dump_stack+0x1b0/0x21e [ 2320.119725][ T7527] ? devkmsg_release+0x11c/0x11c [ 2320.124644][ T7527] ? show_regs_print_info+0x12/0x12 [ 2320.129812][ T7527] ? stack_trace_save+0x111/0x1e0 [ 2320.134810][ T7527] should_fail+0x6fb/0x860 [ 2320.139196][ T7527] ? setup_fault_attr+0x2b0/0x2b0 [ 2320.144188][ T7527] ? __kasan_kmalloc+0x179/0x1b0 [ 2320.149220][ T7527] ? ext4_fill_super+0xd8/0xe890 [ 2320.154137][ T7527] should_failslab+0x5/0x20 [ 2320.158615][ T7527] __kmalloc_track_caller+0x5d/0x2b0 [ 2320.163873][ T7527] ? widen_string+0x3a/0x360 [ 2320.168434][ T7527] ? string+0x280/0x2c0 [ 2320.172622][ T7527] kstrdup+0x31/0x70 [ 2320.176489][ T7527] ext4_fill_super+0xd8/0xe890 [ 2320.181249][ T7527] ? pointer+0x222/0xad0 [ 2320.185478][ T7527] ? pcpu_block_update_hint_alloc+0x98f/0xd00 [ 2320.191514][ T7527] ? string+0x2c0/0x2c0 [ 2320.195642][ T7527] ? vsnprintf+0x1c50/0x1c50 [ 2320.200209][ T7527] ? idr_get_free+0x6de/0x880 [ 2320.204878][ T7527] ? should_fail+0x182/0x860 [ 2320.209441][ T7527] ? vsnprintf+0x1ba3/0x1c50 [ 2320.214004][ T7527] ? ext4_mount+0x40/0x40 [ 2320.218301][ T7527] ? idr_replace+0x1aa/0x220 [ 2320.222859][ T7527] ? snprintf+0xc0/0x110 [ 2320.227070][ T7527] ? up_read+0x10/0x10 [ 2320.231118][ T7527] ? vscnprintf+0x80/0x80 [ 2320.235461][ T7527] ? mount_bdev+0x340/0x340 [ 2320.239944][ T7527] mount_bdev+0x22d/0x340 [ 2320.244250][ T7527] ? ext4_mount+0x40/0x40 [ 2320.248552][ T7527] legacy_get_tree+0xde/0x170 [ 2320.253203][ T7527] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2320.258547][ T7527] vfs_get_tree+0x85/0x260 [ 2320.262934][ T7527] do_mount+0x1883/0x2630 [ 2320.267239][ T7527] ? _raw_spin_unlock+0x5/0x20 [ 2320.271969][ T7527] ? ___slab_alloc+0x297/0x450 [ 2320.276701][ T7527] ? copy_mount_string+0x30/0x30 [ 2320.281616][ T7527] ? copy_mount_options+0x59/0x320 [ 2320.286734][ T7527] ? copy_mount_options+0x293/0x320 [ 2320.291931][ T7527] ksys_mount+0xc2/0xf0 [ 2320.296123][ T7527] __x64_sys_mount+0xb1/0xc0 [ 2320.300713][ T7527] do_syscall_64+0xcb/0x150 [ 2320.305217][ T7527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2320.311076][ T7527] RIP: 0033:0x4608aa [ 2320.314946][ T7527] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2320.334535][ T7527] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 18:55:39 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000e00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:39 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2320.343012][ T7527] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2320.350953][ T7527] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2320.358894][ T7527] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2320.366890][ T7527] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2320.374861][ T7527] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:40 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040610400000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfffffdf9, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:40 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200201000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2320.444509][ T7545] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2320.458676][ T7545] EXT4-fs (loop3): get root inode failed 18:55:40 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000500000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:40 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001100000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2320.491832][ T7551] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2320.506248][ T7554] FAULT_INJECTION: forcing a failure. [ 2320.506248][ T7554] name failslab, interval 1, probability 0, space 0, times 0 [ 2320.522462][ T7545] EXT4-fs (loop3): mount failed [ 2320.534662][ T7554] CPU: 0 PID: 7554 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2320.544748][ T7554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2320.554796][ T7554] Call Trace: [ 2320.558085][ T7554] dump_stack+0x1b0/0x21e [ 2320.562411][ T7554] ? devkmsg_release+0x11c/0x11c [ 2320.567338][ T7554] ? show_regs_print_info+0x12/0x12 [ 2320.572518][ T7554] ? stack_trace_save+0x111/0x1e0 [ 2320.577522][ T7554] ? stack_trace_snprint+0x150/0x150 [ 2320.582788][ T7554] should_fail+0x6fb/0x860 [ 2320.587186][ T7554] ? setup_fault_attr+0x2b0/0x2b0 [ 2320.592194][ T7554] ? __kasan_kmalloc+0x179/0x1b0 [ 2320.597115][ T7554] ? ext4_fill_super+0x10e/0xe890 [ 2320.602116][ T7554] should_failslab+0x5/0x20 [ 2320.606606][ T7554] kmem_cache_alloc_trace+0x39/0x270 [ 2320.611876][ T7554] ? memcpy+0x38/0x50 [ 2320.615839][ T7554] ext4_fill_super+0x10e/0xe890 [ 2320.620673][ T7554] ? pointer+0x222/0xad0 [ 2320.624897][ T7554] ? pcpu_block_update_hint_alloc+0x98f/0xd00 [ 2320.630953][ T7554] ? string+0x2c0/0x2c0 [ 2320.635091][ T7554] ? vsnprintf+0x1c50/0x1c50 [ 2320.639694][ T7554] ? idr_get_free+0x6de/0x880 [ 2320.644359][ T7554] ? should_fail+0x182/0x860 [ 2320.648935][ T7554] ? vsnprintf+0x1ba3/0x1c50 [ 2320.653525][ T7554] ? ext4_mount+0x40/0x40 [ 2320.657833][ T7554] ? idr_replace+0x1aa/0x220 [ 2320.662403][ T7554] ? snprintf+0xc0/0x110 [ 2320.666623][ T7554] ? up_read+0x10/0x10 [ 2320.670674][ T7554] ? vscnprintf+0x80/0x80 [ 2320.674985][ T7554] ? mount_bdev+0x340/0x340 [ 2320.679469][ T7554] mount_bdev+0x22d/0x340 [ 2320.683777][ T7554] ? ext4_mount+0x40/0x40 [ 2320.688089][ T7554] legacy_get_tree+0xde/0x170 [ 2320.692744][ T7554] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2320.698099][ T7554] vfs_get_tree+0x85/0x260 [ 2320.702504][ T7554] do_mount+0x1883/0x2630 [ 2320.706815][ T7554] ? _raw_spin_unlock+0x5/0x20 [ 2320.711555][ T7554] ? ___slab_alloc+0x297/0x450 [ 2320.716295][ T7554] ? copy_mount_string+0x30/0x30 [ 2320.721210][ T7554] ? copy_mount_options+0x59/0x320 [ 2320.726302][ T7554] ? copy_mount_options+0x293/0x320 [ 2320.731479][ T7554] ksys_mount+0xc2/0xf0 [ 2320.735615][ T7554] __x64_sys_mount+0xb1/0xc0 [ 2320.740184][ T7554] do_syscall_64+0xcb/0x150 [ 2320.744667][ T7554] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2320.750534][ T7554] RIP: 0033:0x4608aa [ 2320.754408][ T7554] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2320.773990][ T7554] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2320.782380][ T7554] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2320.790329][ T7554] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2320.798279][ T7554] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2320.806229][ T7554] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2320.814181][ T7554] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:40 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:40 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x221, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfffffdfd, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x900000000000000) 18:55:40 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:40 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000600000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:40 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:40 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001f00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2321.036470][ T7545] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2321.048138][ T7545] EXT4-fs (loop3): get root inode failed [ 2321.053815][ T7545] EXT4-fs (loop3): mount failed 18:55:40 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040040600000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xa00000000000000) [ 2321.118196][ T7587] FAULT_INJECTION: forcing a failure. [ 2321.118196][ T7587] name failslab, interval 1, probability 0, space 0, times 0 [ 2321.132148][ T7581] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2321.152529][ T7587] CPU: 0 PID: 7587 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 18:55:40 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000700000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:40 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200002000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2321.162593][ T7587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2321.172632][ T7587] Call Trace: [ 2321.175918][ T7587] dump_stack+0x1b0/0x21e [ 2321.180243][ T7587] ? devkmsg_release+0x11c/0x11c [ 2321.185172][ T7587] ? show_regs_print_info+0x12/0x12 [ 2321.190360][ T7587] ? stack_trace_save+0x111/0x1e0 [ 2321.195402][ T7587] ? stack_trace_snprint+0x150/0x150 [ 2321.200681][ T7587] should_fail+0x6fb/0x860 [ 2321.205090][ T7587] ? setup_fault_attr+0x2b0/0x2b0 [ 2321.210109][ T7587] ? __kasan_kmalloc+0x179/0x1b0 18:55:40 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000900000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2321.215295][ T7587] ? ext4_fill_super+0x3bc/0xe890 [ 2321.220310][ T7587] should_failslab+0x5/0x20 [ 2321.224816][ T7587] kmem_cache_alloc_trace+0x39/0x270 [ 2321.230149][ T7587] ? memcpy+0x38/0x50 [ 2321.234126][ T7587] ext4_fill_super+0x3bc/0xe890 [ 2321.239030][ T7587] ? pcpu_block_update_hint_alloc+0x98f/0xd00 [ 2321.245085][ T7587] ? string+0x2c0/0x2c0 [ 2321.249235][ T7587] ? vsnprintf+0x1c50/0x1c50 [ 2321.253824][ T7587] ? idr_get_free+0x6de/0x880 [ 2321.258505][ T7587] ? should_fail+0x182/0x860 [ 2321.263095][ T7587] ? vsnprintf+0x1ba3/0x1c50 [ 2321.267679][ T7587] ? ext4_mount+0x40/0x40 [ 2321.272001][ T7587] ? idr_replace+0x1aa/0x220 [ 2321.276588][ T7587] ? snprintf+0xc0/0x110 [ 2321.280842][ T7587] ? up_read+0x10/0x10 [ 2321.284893][ T7587] ? vscnprintf+0x80/0x80 [ 2321.289232][ T7587] mount_bdev+0x22d/0x340 [ 2321.293589][ T7587] ? ext4_mount+0x40/0x40 [ 2321.297922][ T7587] legacy_get_tree+0xde/0x170 [ 2321.302591][ T7587] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2321.307952][ T7587] vfs_get_tree+0x85/0x260 [ 2321.312354][ T7587] do_mount+0x1883/0x2630 [ 2321.316669][ T7587] ? setup_fault_attr+0x2b0/0x2b0 [ 2321.321683][ T7587] ? up_write+0xa1/0x190 [ 2321.325914][ T7587] ? copy_mount_string+0x30/0x30 [ 2321.330841][ T7587] ? retint_kernel+0x1b/0x1b [ 2321.335429][ T7587] ? copy_mount_options+0x1f8/0x320 [ 2321.340610][ T7587] ? copy_mount_options+0x293/0x320 [ 2321.345785][ T7587] ksys_mount+0xc2/0xf0 [ 2321.349922][ T7587] __x64_sys_mount+0xb1/0xc0 [ 2321.354525][ T7587] do_syscall_64+0xcb/0x150 [ 2321.359010][ T7587] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2321.364877][ T7587] RIP: 0033:0x4608aa [ 2321.368751][ T7587] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2321.388334][ T7587] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2321.396742][ T7587] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2321.404689][ T7587] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2321.412638][ T7587] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2321.420587][ T7587] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2321.428551][ T7587] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2321.439567][ T7599] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2321.451424][ T7599] EXT4-fs (loop3): get root inode failed [ 2321.457261][ T7599] EXT4-fs (loop3): mount failed 18:55:41 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x300, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:41 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200102000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:41 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000a00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xffffff7f, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:41 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2321.585048][ T7599] EXT4-fs: failed to create workqueue [ 2321.590490][ T7599] EXT4-fs (loop3): mount failed 18:55:41 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200002200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:41 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200002500000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:41 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200272500000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2321.909895][ T7632] FAULT_INJECTION: forcing a failure. [ 2321.909895][ T7632] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2321.924513][ T7632] CPU: 0 PID: 7632 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2321.934571][ T7632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2321.944649][ T7632] Call Trace: [ 2321.947943][ T7632] dump_stack+0x1b0/0x21e [ 2321.952255][ T7632] ? devkmsg_release+0x11c/0x11c [ 2321.957171][ T7632] ? show_regs_print_info+0x12/0x12 [ 2321.962346][ T7632] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2321.968389][ T7632] should_fail+0x6fb/0x860 [ 2321.972789][ T7632] ? setup_fault_attr+0x2b0/0x2b0 [ 2321.977790][ T7632] ? mem_cgroup_charge_statistics+0x12a/0x7d0 [ 2321.983848][ T7632] ? get_mem_cgroup_from_mm+0x27b/0x2c0 [ 2321.989375][ T7632] __alloc_pages_nodemask+0x1ee/0x7c0 [ 2321.994731][ T7632] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2322.000265][ T7632] alloc_slab_page+0x3a/0x390 [ 2322.004944][ T7632] new_slab+0x97/0x450 [ 2322.008991][ T7632] ___slab_alloc+0x2e0/0x450 [ 2322.013561][ T7632] ? add_to_page_cache_lru+0x20b/0x280 [ 2322.018996][ T7632] ? alloc_buffer_head+0x26/0x270 [ 2322.023995][ T7632] ? __should_failslab+0x92/0x150 [ 2322.029113][ T7632] ? alloc_buffer_head+0x26/0x270 [ 2322.034139][ T7632] kmem_cache_alloc+0x230/0x250 [ 2322.038973][ T7632] ? __add_to_page_cache_locked+0x8a0/0x8a0 [ 2322.044866][ T7632] alloc_buffer_head+0x26/0x270 [ 2322.049713][ T7632] alloc_page_buffers+0x109/0x3e0 [ 2322.054717][ T7632] __getblk_gfp+0x3e2/0x750 [ 2322.059214][ T7632] __bread_gfp+0x2a/0x310 [ 2322.063523][ T7632] ext4_fill_super+0x874/0xe890 [ 2322.068354][ T7632] ? pcpu_block_update_hint_alloc+0x98f/0xd00 [ 2322.074401][ T7632] ? vsnprintf+0x1c50/0x1c50 [ 2322.078972][ T7632] ? idr_get_free+0x6de/0x880 [ 2322.083642][ T7632] ? should_fail+0x182/0x860 [ 2322.088214][ T7632] ? ext4_mount+0x40/0x40 [ 2322.092520][ T7632] ? idr_replace+0x1aa/0x220 [ 2322.097104][ T7632] ? snprintf+0xc0/0x110 [ 2322.101340][ T7632] ? up_read+0x10/0x10 [ 2322.105400][ T7632] ? vscnprintf+0x80/0x80 [ 2322.109710][ T7632] mount_bdev+0x22d/0x340 [ 2322.114051][ T7632] ? ext4_mount+0x40/0x40 [ 2322.118359][ T7632] legacy_get_tree+0xde/0x170 [ 2322.123022][ T7632] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2322.128389][ T7632] vfs_get_tree+0x85/0x260 [ 2322.132790][ T7632] do_mount+0x1883/0x2630 [ 2322.137121][ T7632] ? setup_fault_attr+0x2b0/0x2b0 [ 2322.142122][ T7632] ? up_write+0xa1/0x190 [ 2322.146352][ T7632] ? setup_fault_attr+0x2b0/0x2b0 [ 2322.151354][ T7632] ? copy_mount_string+0x30/0x30 [ 2322.156289][ T7632] ? retain_dentry+0x275/0x360 [ 2322.161030][ T7632] ? copy_mount_options+0x59/0x320 [ 2322.166138][ T7632] ? copy_mount_options+0x293/0x320 [ 2322.171332][ T7632] ksys_mount+0xc2/0xf0 [ 2322.175470][ T7632] __x64_sys_mount+0xb1/0xc0 [ 2322.180037][ T7632] do_syscall_64+0xcb/0x150 [ 2322.184538][ T7632] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2322.190409][ T7632] RIP: 0033:0x4608aa [ 2322.194304][ T7632] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2322.213888][ T7632] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2322.222284][ T7632] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2322.230234][ T7632] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2322.238224][ T7632] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2322.246189][ T7632] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 18:55:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xb00000000000000) 18:55:41 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200252700000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:41 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000b00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xffffff8c, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2322.254153][ T7632] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2322.283268][ T7634] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2322.297251][ T7632] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2322.321777][ T7634] EXT4-fs (loop3): get root inode failed [ 2322.374971][ T7634] EXT4-fs (loop3): mount failed [ 2322.514258][ T7648] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2322.533063][ T7634] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2322.544825][ T7634] EXT4-fs (loop3): get root inode failed [ 2322.550530][ T7634] EXT4-fs (loop3): mount failed 18:55:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x362, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:42 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200003f00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:42 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000c00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:42 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xffffff97, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xc00000000000000) 18:55:42 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000d00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2322.712016][ T7665] FAULT_INJECTION: forcing a failure. [ 2322.712016][ T7665] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.715551][ T7662] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2322.728994][ T7665] CPU: 0 PID: 7665 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2322.743552][ T7665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2322.753612][ T7665] Call Trace: [ 2322.756881][ T7665] dump_stack+0x1b0/0x21e [ 2322.761187][ T7665] ? devkmsg_release+0x11c/0x11c [ 2322.766093][ T7665] ? prepare_to_wait+0x20b/0x270 [ 2322.771040][ T7665] ? show_regs_print_info+0x12/0x12 [ 2322.776244][ T7665] ? schedule+0x13b/0x1d0 [ 2322.780553][ T7665] should_fail+0x6fb/0x860 [ 2322.784946][ T7665] ? setup_fault_attr+0x2b0/0x2b0 [ 2322.789943][ T7665] ? __up_read+0x6f/0x1b0 [ 2322.794242][ T7665] ? __down_read+0x210/0x210 [ 2322.798800][ T7665] ? kzalloc+0x1b/0x30 [ 2322.802838][ T7665] should_failslab+0x5/0x20 [ 2322.807312][ T7665] __kmalloc+0x5f/0x2c0 [ 2322.811445][ T7665] kzalloc+0x1b/0x30 [ 2322.815311][ T7665] crypto_create_tfm+0x6c/0x2e0 [ 2322.820129][ T7665] ? crypto_alg_mod_lookup+0x4cf/0x810 [ 2322.825565][ T7665] crypto_alloc_tfm+0x15d/0x2f0 [ 2322.830384][ T7665] ext4_fill_super+0xb9e/0xe890 [ 2322.835217][ T7665] ? pcpu_block_update_hint_alloc+0x98f/0xd00 [ 2322.841264][ T7665] ? vsnprintf+0x1c50/0x1c50 [ 2322.845838][ T7665] ? idr_get_free+0x6de/0x880 [ 2322.850485][ T7665] ? should_fail+0x182/0x860 [ 2322.855046][ T7665] ? ext4_mount+0x40/0x40 [ 2322.859352][ T7665] ? idr_replace+0x1aa/0x220 [ 2322.863922][ T7665] ? snprintf+0xc0/0x110 [ 2322.868142][ T7665] ? up_read+0x10/0x10 [ 2322.872202][ T7665] ? vscnprintf+0x80/0x80 [ 2322.876502][ T7665] mount_bdev+0x22d/0x340 [ 2322.880801][ T7665] ? ext4_mount+0x40/0x40 [ 2322.885115][ T7665] legacy_get_tree+0xde/0x170 [ 2322.889760][ T7665] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2322.895132][ T7665] vfs_get_tree+0x85/0x260 [ 2322.899519][ T7665] do_mount+0x1883/0x2630 [ 2322.903819][ T7665] ? copy_mount_string+0x30/0x30 [ 2322.908735][ T7665] ? copy_mount_options+0x1f8/0x320 [ 2322.913904][ T7665] ? copy_mount_options+0x230/0x320 [ 2322.919071][ T7665] ? __sanitizer_cov_trace_const_cmp4+0x4/0x90 [ 2322.925205][ T7665] ? copy_mount_options+0x293/0x320 [ 2322.930396][ T7665] ksys_mount+0xc2/0xf0 [ 2322.934544][ T7665] __x64_sys_mount+0xb1/0xc0 [ 2322.939119][ T7665] do_syscall_64+0xcb/0x150 [ 2322.943611][ T7665] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2322.949472][ T7665] RIP: 0033:0x4608aa [ 2322.953334][ T7665] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2322.972908][ T7665] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2322.981307][ T7665] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2322.989253][ T7665] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2322.997198][ T7665] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2323.005238][ T7665] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 18:55:42 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:42 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2323.013208][ T7665] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2323.022752][ T7665] EXT4-fs (loop4): Cannot load crc32c driver. 18:55:42 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xd00000000000000) 18:55:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfffffff0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2323.076220][ T7667] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2323.095871][ T7667] EXT4-fs (loop3): get root inode failed [ 2323.104105][ T7667] EXT4-fs (loop3): mount failed 18:55:42 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x363, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:42 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044100000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:42 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000e00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2323.222320][ T7688] FAULT_INJECTION: forcing a failure. [ 2323.222320][ T7688] name failslab, interval 1, probability 0, space 0, times 0 [ 2323.222433][ T7667] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2323.247015][ T7667] EXT4-fs (loop3): get root inode failed [ 2323.254104][ T7667] EXT4-fs (loop3): mount failed [ 2323.263840][ T7688] CPU: 1 PID: 7688 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2323.273982][ T7688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2323.284008][ T7688] Call Trace: [ 2323.287273][ T7688] dump_stack+0x1b0/0x21e [ 2323.291600][ T7688] ? devkmsg_release+0x11c/0x11c [ 2323.296527][ T7688] ? show_regs_print_info+0x12/0x12 [ 2323.301699][ T7688] ? mem_cgroup_charge_statistics+0x12a/0x7d0 [ 2323.307736][ T7688] ? get_mem_cgroup_from_mm+0x27b/0x2c0 [ 2323.313255][ T7688] should_fail+0x6fb/0x860 [ 2323.317641][ T7688] ? setup_fault_attr+0x2b0/0x2b0 [ 2323.322637][ T7688] ? mempool_alloc_slab+0x16/0x30 [ 2323.327632][ T7688] ? mempool_free+0x380/0x380 [ 2323.332277][ T7688] should_failslab+0x5/0x20 [ 2323.336751][ T7688] kmem_cache_alloc+0x36/0x250 [ 2323.341485][ T7688] ? mempool_free+0x380/0x380 [ 2323.346130][ T7688] mempool_alloc_slab+0x16/0x30 [ 2323.350948][ T7688] mempool_alloc+0x100/0x650 [ 2323.355516][ T7688] ? _raw_spin_lock+0xa1/0x170 [ 2323.360259][ T7688] ? _raw_spin_trylock_bh+0x190/0x190 [ 2323.365624][ T7688] ? mempool_resize+0x910/0x910 [ 2323.372877][ T7688] ? __find_get_block+0xf62/0x1010 [ 2323.377959][ T7688] ? alloc_buffer_head+0x26/0x270 [ 2323.382957][ T7688] bio_alloc_bioset+0x1fc/0x660 [ 2323.387780][ T7688] ? _raw_spin_lock+0xa1/0x170 [ 2323.392558][ T7688] ? bio_chain_endio+0xf0/0xf0 [ 2323.397295][ T7688] ? init_page_buffers+0x377/0x3a0 [ 2323.402379][ T7688] submit_bh_wbc+0x1ba/0x790 [ 2323.406966][ T7688] __bread_gfp+0x181/0x310 [ 2323.411352][ T7688] ext4_fill_super+0x874/0xe890 [ 2323.416175][ T7688] ? pcpu_block_update_hint_alloc+0x98f/0xd00 [ 2323.422222][ T7688] ? vsnprintf+0x1c50/0x1c50 [ 2323.426806][ T7688] ? idr_get_free+0x6de/0x880 [ 2323.431456][ T7688] ? should_fail+0x182/0x860 [ 2323.436017][ T7688] ? ext4_mount+0x40/0x40 [ 2323.440313][ T7688] ? idr_replace+0x1aa/0x220 [ 2323.444873][ T7688] ? snprintf+0xc0/0x110 [ 2323.449083][ T7688] ? up_read+0x10/0x10 [ 2323.453128][ T7688] ? vscnprintf+0x80/0x80 [ 2323.457446][ T7688] mount_bdev+0x22d/0x340 [ 2323.461873][ T7688] ? ext4_mount+0x40/0x40 [ 2323.466197][ T7688] legacy_get_tree+0xde/0x170 [ 2323.470862][ T7688] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2323.476202][ T7688] vfs_get_tree+0x85/0x260 [ 2323.480589][ T7688] do_mount+0x1883/0x2630 [ 2323.484893][ T7688] ? setup_fault_attr+0x2b0/0x2b0 [ 2323.489896][ T7688] ? up_write+0xa1/0x190 [ 2323.494113][ T7688] ? ___slab_alloc+0x9b/0x450 [ 2323.498760][ T7688] ? copy_mount_string+0x30/0x30 [ 2323.503677][ T7688] ? retain_dentry+0x275/0x360 [ 2323.508412][ T7688] ? copy_mount_options+0x59/0x320 [ 2323.513493][ T7688] ? copy_mount_options+0x293/0x320 [ 2323.518660][ T7688] ksys_mount+0xc2/0xf0 [ 2323.522805][ T7688] __x64_sys_mount+0xb1/0xc0 [ 2323.527365][ T7688] do_syscall_64+0xcb/0x150 [ 2323.531872][ T7688] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2323.537743][ T7688] RIP: 0033:0x4608aa [ 2323.541608][ T7688] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2323.561183][ T7688] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2323.569563][ T7688] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2323.577527][ T7688] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2323.585474][ T7688] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2323.593412][ T7688] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2323.601354][ T7688] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfffffff6, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:43 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:43 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040201000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044300000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2323.624333][ T7688] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2323.653012][ T7700] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044500000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2323.748079][ T7706] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2323.760223][ T7706] EXT4-fs (loop3): get root inode failed [ 2323.766023][ T7706] EXT4-fs (loop3): mount failed 18:55:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xe00000000000000) 18:55:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044600000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2323.888798][ T7723] FAULT_INJECTION: forcing a failure. [ 2323.888798][ T7723] name failslab, interval 1, probability 0, space 0, times 0 [ 2323.901623][ T7723] CPU: 1 PID: 7723 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2323.911672][ T7723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2323.921700][ T7723] Call Trace: [ 2323.924986][ T7723] dump_stack+0x1b0/0x21e [ 2323.929304][ T7723] ? devkmsg_release+0x11c/0x11c [ 2323.934225][ T7723] ? show_regs_print_info+0x12/0x12 [ 2323.939408][ T7723] ? __wait_on_bit+0x177/0x190 [ 2323.944149][ T7723] ? bit_wait+0x90/0x90 [ 2323.948285][ T7723] should_fail+0x6fb/0x860 [ 2323.952682][ T7723] ? setup_fault_attr+0x2b0/0x2b0 [ 2323.957683][ T7723] ? bit_waitqueue+0x30/0x30 [ 2323.962250][ T7723] ? kvmalloc_node+0xc2/0x120 [ 2323.966932][ T7723] should_failslab+0x5/0x20 [ 2323.971428][ T7723] __kmalloc+0x5f/0x2c0 [ 2323.975563][ T7723] kvmalloc_node+0xc2/0x120 [ 2323.980042][ T7723] ext4_fill_super+0x5787/0xe890 [ 2323.984965][ T7723] ? ext4_mount+0x40/0x40 [ 2323.989270][ T7723] ? idr_replace+0x1aa/0x220 [ 2323.993842][ T7723] ? snprintf+0xc0/0x110 [ 2323.998062][ T7723] ? up_read+0x10/0x10 [ 2324.002107][ T7723] ? vscnprintf+0x80/0x80 [ 2324.006421][ T7723] mount_bdev+0x22d/0x340 [ 2324.010730][ T7723] ? ext4_mount+0x40/0x40 [ 2324.015043][ T7723] legacy_get_tree+0xde/0x170 [ 2324.019694][ T7723] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2324.025046][ T7723] vfs_get_tree+0x85/0x260 [ 2324.029438][ T7723] do_mount+0x1883/0x2630 [ 2324.033746][ T7723] ? _raw_spin_unlock+0x5/0x20 [ 2324.038486][ T7723] ? ___slab_alloc+0x297/0x450 [ 2324.043254][ T7723] ? copy_mount_string+0x30/0x30 [ 2324.048173][ T7723] ? copy_mount_options+0x59/0x320 [ 2324.053267][ T7723] ? copy_mount_options+0x293/0x320 [ 2324.058448][ T7723] ksys_mount+0xc2/0xf0 [ 2324.062589][ T7723] __x64_sys_mount+0xb1/0xc0 [ 2324.067156][ T7723] do_syscall_64+0xcb/0x150 [ 2324.071659][ T7723] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2324.077526][ T7723] RIP: 0033:0x4608aa [ 2324.081406][ T7723] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2324.100993][ T7723] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2324.109416][ T7723] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2324.117367][ T7723] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2324.125331][ T7723] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2324.133289][ T7723] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2324.141238][ T7723] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2324.152150][ T7723] EXT4-fs (loop4): not enough memory [ 2324.168195][ T7706] EXT4-fs: failed to create workqueue [ 2324.174178][ T7706] EXT4-fs (loop3): mount failed 18:55:43 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x366, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044700000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:43 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040001100000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfffffffd, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:43 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x1000000000000000) [ 2324.263082][ T7732] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2324.323414][ T7744] FAULT_INJECTION: forcing a failure. [ 2324.323414][ T7744] name failslab, interval 1, probability 0, space 0, times 0 [ 2324.328345][ T7745] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2324.336025][ T7744] CPU: 0 PID: 7744 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2324.336031][ T7744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2324.336033][ T7744] Call Trace: [ 2324.336052][ T7744] dump_stack+0x1b0/0x21e [ 2324.336068][ T7744] ? devkmsg_release+0x11c/0x11c [ 2324.359787][ T7745] EXT4-fs (loop3): get root inode failed [ 2324.367854][ T7744] ? show_regs_print_info+0x12/0x12 [ 2324.367863][ T7744] ? memset+0x1f/0x40 [ 2324.367873][ T7744] ? unwind_next_frame+0x1c07/0x22b0 [ 2324.367890][ T7744] should_fail+0x6fb/0x860 [ 2324.373661][ T7745] EXT4-fs (loop3): mount failed [ 2324.375460][ T7744] ? setup_fault_attr+0x2b0/0x2b0 [ 2324.375471][ T7744] ? mod_delayed_work_on+0x106/0x160 18:55:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfffffffe, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:43 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:43 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040001200000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:44 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044900000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:44 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044a00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2324.375484][ T7744] ? xas_create+0x4f9/0x1360 [ 2324.424462][ T7744] should_failslab+0x5/0x20 [ 2324.428956][ T7744] kmem_cache_alloc+0x36/0x250 [ 2324.433708][ T7744] xas_create+0x4f9/0x1360 [ 2324.438107][ T7744] xas_store+0x93/0x13b0 [ 2324.442335][ T7744] ? _raw_spin_lock_irq+0xa2/0x180 [ 2324.447432][ T7744] ? _raw_spin_lock_irqsave+0x1c0/0x1c0 [ 2324.452959][ T7744] ? __kernel_text_address+0x93/0x110 [ 2324.458304][ T7744] ? xas_load+0x46f/0x4c0 [ 2324.462614][ T7744] __add_to_page_cache_locked+0x390/0x8a0 [ 2324.468325][ T7744] ? add_to_page_cache_locked+0x30/0x30 [ 2324.473854][ T7744] ? workingset_activation+0x150/0x150 [ 2324.479285][ T7744] ? __alloc_pages_nodemask+0x374/0x7c0 [ 2324.484802][ T7744] add_to_page_cache_lru+0x11d/0x280 [ 2324.490058][ T7744] ? __add_to_page_cache_locked+0x8a0/0x8a0 [ 2324.495928][ T7744] ? schedule+0x13b/0x1d0 [ 2324.500229][ T7744] pagecache_get_page+0x5ea/0x8a0 [ 2324.505242][ T7744] ? __wait_on_bit+0x177/0x190 [ 2324.509980][ T7744] __getblk_gfp+0x208/0x750 [ 2324.514452][ T7744] ? should_fail+0x182/0x860 [ 2324.519025][ T7744] ? bit_wait+0x90/0x90 [ 2324.523154][ T7744] __breadahead_gfp+0x8e/0x190 [ 2324.527890][ T7744] ? kvmalloc_node+0xc2/0x120 [ 2324.532534][ T7744] ? __breadahead+0x170/0x170 [ 2324.537178][ T7744] ? __kmalloc+0xf7/0x2c0 [ 2324.541490][ T7744] ? kvmalloc_node+0xc2/0x120 [ 2324.546153][ T7744] ext4_fill_super+0x609e/0xe890 [ 2324.551067][ T7744] ? ext4_mount+0x40/0x40 [ 2324.555382][ T7744] ? idr_replace+0x1aa/0x220 [ 2324.559958][ T7744] ? snprintf+0xc0/0x110 [ 2324.564171][ T7744] ? up_read+0x10/0x10 [ 2324.568213][ T7744] ? vscnprintf+0x80/0x80 [ 2324.572541][ T7744] mount_bdev+0x22d/0x340 [ 2324.576838][ T7744] ? ext4_mount+0x40/0x40 [ 2324.581136][ T7744] legacy_get_tree+0xde/0x170 [ 2324.585781][ T7744] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2324.591120][ T7744] vfs_get_tree+0x85/0x260 [ 2324.595526][ T7744] do_mount+0x1883/0x2630 [ 2324.599826][ T7744] ? setup_fault_attr+0x2b0/0x2b0 [ 2324.604938][ T7744] ? up_write+0xa1/0x190 [ 2324.609157][ T7744] ? setup_fault_attr+0x2b0/0x2b0 [ 2324.614163][ T7744] ? copy_mount_string+0x30/0x30 [ 2324.619086][ T7744] ? retain_dentry+0x275/0x360 [ 2324.623826][ T7744] ? copy_mount_options+0x59/0x320 [ 2324.628907][ T7744] ? copy_mount_options+0x293/0x320 [ 2324.634072][ T7744] ksys_mount+0xc2/0xf0 [ 2324.638199][ T7744] __x64_sys_mount+0xb1/0xc0 [ 2324.642756][ T7744] do_syscall_64+0xcb/0x150 [ 2324.647232][ T7744] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2324.653106][ T7744] RIP: 0033:0x4608aa [ 2324.656983][ T7744] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2324.676557][ T7744] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2324.684956][ T7744] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2324.692922][ T7744] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2324.700870][ T7744] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2324.708810][ T7744] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2324.716767][ T7744] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2324.738254][ T7744] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2324.876075][ T7745] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2324.888204][ T7745] EXT4-fs (loop3): get root inode failed [ 2324.894937][ T7745] EXT4-fs (loop3): mount failed 18:55:44 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x367, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:44 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044b00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:44 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:44 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040001300000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:44 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004c00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x80000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:44 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x1100000000000000) [ 2324.984236][ T7764] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:44 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200044c00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:44 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040001f00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2325.054226][ T7777] FAULT_INJECTION: forcing a failure. [ 2325.054226][ T7777] name failslab, interval 1, probability 0, space 0, times 0 [ 2325.068283][ T7777] CPU: 1 PID: 7777 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2325.078349][ T7777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2325.088393][ T7777] Call Trace: [ 2325.091675][ T7777] dump_stack+0x1b0/0x21e [ 2325.095996][ T7777] ? devkmsg_release+0x11c/0x11c [ 2325.100925][ T7777] ? stack_trace_save+0x111/0x1e0 [ 2325.105944][ T7777] ? show_regs_print_info+0x12/0x12 [ 2325.111136][ T7777] ? stack_trace_snprint+0x150/0x150 [ 2325.116414][ T7777] ? mem_cgroup_charge_statistics+0x12a/0x7d0 [ 2325.122476][ T7777] should_fail+0x6fb/0x860 [ 2325.126886][ T7777] ? setup_fault_attr+0x2b0/0x2b0 [ 2325.131901][ T7777] ? __kasan_kmalloc+0x179/0x1b0 [ 2325.136860][ T7777] ? mem_cgroup_try_charge_delay+0x10/0x10 [ 2325.142658][ T7777] ? __rcu_read_lock+0x50/0x50 [ 2325.147415][ T7777] ? kmem_cache_alloc+0x1d5/0x250 [ 2325.152430][ T7777] ? alloc_buffer_head+0x26/0x270 [ 2325.157432][ T7777] ? xas_load+0x468/0x4c0 [ 2325.161740][ T7777] ? mempool_alloc_slab+0x16/0x30 [ 2325.166740][ T7777] ? mempool_free+0x380/0x380 [ 2325.171393][ T7777] should_failslab+0x5/0x20 [ 2325.175874][ T7777] kmem_cache_alloc+0x36/0x250 [ 2325.180615][ T7777] ? mempool_free+0x380/0x380 [ 2325.185284][ T7777] mempool_alloc_slab+0x16/0x30 [ 2325.190114][ T7777] mempool_alloc+0x100/0x650 [ 2325.194685][ T7777] ? workingset_activation+0x150/0x150 [ 2325.200123][ T7777] ? mempool_resize+0x910/0x910 [ 2325.204978][ T7777] ? _raw_spin_lock+0xa1/0x170 [ 2325.209721][ T7777] ? _raw_spin_trylock_bh+0x190/0x190 [ 2325.215071][ T7777] ? add_to_page_cache_lru+0x20b/0x280 [ 2325.220511][ T7777] bio_alloc_bioset+0x1fc/0x660 [ 2325.225347][ T7777] ? bio_chain_endio+0xf0/0xf0 [ 2325.230090][ T7777] ? write_boundary_block+0x150/0x150 [ 2325.235449][ T7777] ? _raw_spin_lock+0xa1/0x170 [ 2325.240196][ T7777] submit_bh_wbc+0x1ba/0x790 [ 2325.244768][ T7777] ? __getblk_gfp+0x64a/0x750 [ 2325.249423][ T7777] ll_rw_block+0x1cb/0x230 [ 2325.253843][ T7777] __breadahead_gfp+0xc9/0x190 [ 2325.258619][ T7777] ? kvmalloc_node+0xc2/0x120 [ 2325.263276][ T7777] ? __breadahead+0x170/0x170 [ 2325.267931][ T7777] ? __kmalloc+0xf7/0x2c0 [ 2325.272277][ T7777] ext4_fill_super+0x609e/0xe890 [ 2325.277212][ T7777] ? ext4_mount+0x40/0x40 [ 2325.281515][ T7777] ? idr_replace+0x1aa/0x220 [ 2325.286084][ T7777] ? snprintf+0xc0/0x110 [ 2325.290301][ T7777] ? up_read+0x10/0x10 [ 2325.294345][ T7777] ? vscnprintf+0x80/0x80 [ 2325.298654][ T7777] mount_bdev+0x22d/0x340 [ 2325.302960][ T7777] ? ext4_mount+0x40/0x40 [ 2325.307265][ T7777] legacy_get_tree+0xde/0x170 [ 2325.311946][ T7777] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2325.317294][ T7777] vfs_get_tree+0x85/0x260 [ 2325.321689][ T7777] do_mount+0x1883/0x2630 [ 2325.326000][ T7777] ? setup_fault_attr+0x2b0/0x2b0 [ 2325.331015][ T7777] ? up_write+0xa1/0x190 [ 2325.335232][ T7777] ? setup_fault_attr+0x2b0/0x2b0 [ 2325.340230][ T7777] ? copy_mount_string+0x30/0x30 [ 2325.345145][ T7777] ? retain_dentry+0x275/0x360 [ 2325.349886][ T7777] ? copy_mount_options+0x59/0x320 [ 2325.354974][ T7777] ? copy_mount_options+0x293/0x320 [ 2325.360164][ T7777] ksys_mount+0xc2/0xf0 [ 2325.364300][ T7777] __x64_sys_mount+0xb1/0xc0 [ 2325.368866][ T7777] do_syscall_64+0xcb/0x150 [ 2325.373348][ T7777] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2325.379223][ T7777] RIP: 0033:0x4608aa [ 2325.383100][ T7777] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2325.402680][ T7777] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2325.411068][ T7777] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2325.419046][ T7777] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2325.426994][ T7777] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2325.434941][ T7777] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2325.442887][ T7777] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2325.465617][ T7777] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2325.475742][ T7780] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid 18:55:45 executing program 4 (fault-call:0 fault-nth:67): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xedc000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:45 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200006000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2325.509101][ T7780] EXT4-fs (loop3): get root inode failed [ 2325.511181][ T7790] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2325.533663][ T7780] EXT4-fs (loop3): mount failed [ 2325.622130][ T7780] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2325.636948][ T7780] EXT4-fs (loop3): get root inode failed [ 2325.643230][ T7780] EXT4-fs (loop3): mount failed [ 2325.658172][ T7808] FAULT_INJECTION: forcing a failure. [ 2325.658172][ T7808] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2325.671343][ T7808] CPU: 0 PID: 7808 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2325.681365][ T7808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2325.691388][ T7808] Call Trace: [ 2325.694650][ T7808] dump_stack+0x1b0/0x21e [ 2325.698948][ T7808] ? devkmsg_release+0x11c/0x11c [ 2325.703873][ T7808] ? memset+0x1f/0x40 [ 2325.707826][ T7808] ? show_regs_print_info+0x12/0x12 [ 2325.713008][ T7808] ? unwind_next_frame+0x1c07/0x22b0 [ 2325.718266][ T7808] should_fail+0x6fb/0x860 [ 2325.722653][ T7808] ? setup_fault_attr+0x2b0/0x2b0 [ 2325.727660][ T7808] ? 0xffffffffa0128000 [ 2325.731799][ T7808] __alloc_pages_nodemask+0x1ee/0x7c0 [ 2325.737157][ T7808] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2325.742760][ T7808] ? stack_trace_save+0x111/0x1e0 [ 2325.747752][ T7808] alloc_slab_page+0x3a/0x390 [ 2325.752399][ T7808] ? mem_cgroup_charge_statistics+0x12a/0x7d0 [ 2325.758433][ T7808] new_slab+0x97/0x450 [ 2325.762471][ T7808] ___slab_alloc+0x2e0/0x450 [ 2325.767053][ T7808] ? __rcu_read_lock+0x50/0x50 [ 2325.771802][ T7808] ? kmem_cache_alloc+0x1d5/0x250 [ 2325.776803][ T7808] ? alloc_buffer_head+0x26/0x270 [ 2325.781804][ T7808] ? xas_load+0x468/0x4c0 [ 2325.786114][ T7808] ? mempool_alloc_slab+0x16/0x30 [ 2325.791105][ T7808] ? mempool_alloc_slab+0x16/0x30 [ 2325.796115][ T7808] kmem_cache_alloc+0x230/0x250 [ 2325.800937][ T7808] ? mempool_free+0x380/0x380 [ 2325.805598][ T7808] mempool_alloc_slab+0x16/0x30 [ 2325.810419][ T7808] mempool_alloc+0x100/0x650 [ 2325.814989][ T7808] ? workingset_activation+0x150/0x150 [ 2325.820438][ T7808] ? mempool_resize+0x910/0x910 [ 2325.825264][ T7808] ? _raw_spin_lock+0xa1/0x170 [ 2325.830017][ T7808] ? _raw_spin_trylock_bh+0x190/0x190 [ 2325.835369][ T7808] ? add_to_page_cache_lru+0x20b/0x280 [ 2325.840797][ T7808] bio_alloc_bioset+0x1fc/0x660 [ 2325.845741][ T7808] ? bio_chain_endio+0xf0/0xf0 [ 2325.850483][ T7808] ? write_boundary_block+0x150/0x150 [ 2325.855821][ T7808] ? _raw_spin_lock+0xa1/0x170 [ 2325.860555][ T7808] submit_bh_wbc+0x1ba/0x790 [ 2325.865119][ T7808] ? __getblk_gfp+0x64a/0x750 [ 2325.869764][ T7808] ll_rw_block+0x1cb/0x230 [ 2325.874157][ T7808] __breadahead_gfp+0xc9/0x190 [ 2325.878887][ T7808] ? kvmalloc_node+0xc2/0x120 [ 2325.883532][ T7808] ? __breadahead+0x170/0x170 [ 2325.888197][ T7808] ? __kmalloc+0xf7/0x2c0 [ 2325.892504][ T7808] ext4_fill_super+0x609e/0xe890 [ 2325.897413][ T7808] ? ext4_mount+0x40/0x40 [ 2325.901725][ T7808] ? idr_replace+0x1aa/0x220 [ 2325.906302][ T7808] ? snprintf+0xc0/0x110 [ 2325.910513][ T7808] ? up_read+0x10/0x10 [ 2325.914554][ T7808] ? vscnprintf+0x80/0x80 [ 2325.918866][ T7808] mount_bdev+0x22d/0x340 [ 2325.923172][ T7808] ? ext4_mount+0x40/0x40 [ 2325.927498][ T7808] legacy_get_tree+0xde/0x170 [ 2325.932145][ T7808] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2325.937500][ T7808] vfs_get_tree+0x85/0x260 [ 2325.941883][ T7808] do_mount+0x1883/0x2630 [ 2325.946183][ T7808] ? setup_fault_attr+0x2b0/0x2b0 [ 2325.951175][ T7808] ? up_write+0xa1/0x190 [ 2325.955392][ T7808] ? ___slab_alloc+0x9b/0x450 [ 2325.960047][ T7808] ? copy_mount_string+0x30/0x30 [ 2325.964952][ T7808] ? retain_dentry+0x275/0x360 [ 2325.969690][ T7808] ? copy_mount_options+0x59/0x320 [ 2325.974777][ T7808] ? copy_mount_options+0x293/0x320 [ 2325.979947][ T7808] ksys_mount+0xc2/0xf0 [ 2325.984072][ T7808] __x64_sys_mount+0xb1/0xc0 [ 2325.988631][ T7808] do_syscall_64+0xcb/0x150 [ 2325.993119][ T7808] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2325.998980][ T7808] RIP: 0033:0x4608aa [ 2326.002858][ T7808] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2326.022429][ T7808] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2326.030808][ T7808] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2326.038753][ T7808] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2326.046702][ T7808] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2326.054645][ T7808] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2326.062587][ T7808] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2326.083078][ T7808] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 18:55:45 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x36a, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:45 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200016100000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x1200000000000000) 18:55:45 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040002000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x1000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:45 executing program 4 (fault-call:0 fault-nth:68): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:45 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200006800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x4000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:45 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200006c00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:45 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040102000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2326.275209][ T7818] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2326.285673][ T7822] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2326.312712][ T7833] FAULT_INJECTION: forcing a failure. [ 2326.312712][ T7833] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.315128][ T7822] EXT4-fs (loop3): get root inode failed [ 2326.328947][ T7833] CPU: 0 PID: 7833 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2326.338364][ T7822] EXT4-fs (loop3): mount failed [ 2326.341173][ T7833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2326.341177][ T7833] Call Trace: [ 2326.341198][ T7833] dump_stack+0x1b0/0x21e [ 2326.341209][ T7833] ? devkmsg_release+0x11c/0x11c [ 2326.341220][ T7833] ? show_regs_print_info+0x12/0x12 18:55:45 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200016d00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:45 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200007400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2326.341240][ T7833] ? should_fail+0x182/0x860 [ 2326.378308][ T7833] ? setup_fault_attr+0x2b0/0x2b0 [ 2326.383315][ T7833] should_fail+0x6fb/0x860 [ 2326.387706][ T7833] ? setup_fault_attr+0x2b0/0x2b0 [ 2326.392711][ T7833] ? ___slab_alloc+0x9b/0x450 [ 2326.397374][ T7833] ? up_read+0x10/0x10 [ 2326.401423][ T7833] ? mb_cache_create+0x61/0x3c0 [ 2326.406248][ T7833] ? mb_cache_create+0x139/0x3c0 [ 2326.411156][ T7833] should_failslab+0x5/0x20 [ 2326.415627][ T7833] __kmalloc+0x5f/0x2c0 [ 2326.419751][ T7833] mb_cache_create+0x139/0x3c0 [ 2326.424483][ T7833] ext4_fill_super+0x9333/0xe890 [ 2326.429399][ T7833] ? ext4_mount+0x40/0x40 [ 2326.433763][ T7833] ? idr_replace+0x1aa/0x220 [ 2326.438363][ T7833] ? snprintf+0xc0/0x110 [ 2326.442583][ T7833] ? up_read+0x10/0x10 [ 2326.446629][ T7833] ? vscnprintf+0x80/0x80 [ 2326.450931][ T7833] mount_bdev+0x22d/0x340 [ 2326.455229][ T7833] ? ext4_mount+0x40/0x40 [ 2326.459528][ T7833] legacy_get_tree+0xde/0x170 [ 2326.464174][ T7833] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2326.469513][ T7833] vfs_get_tree+0x85/0x260 [ 2326.473925][ T7833] do_mount+0x1883/0x2630 [ 2326.478228][ T7833] ? setup_fault_attr+0x2b0/0x2b0 [ 2326.483219][ T7833] ? up_write+0xa1/0x190 [ 2326.487438][ T7833] ? setup_fault_attr+0x2b0/0x2b0 [ 2326.492443][ T7833] ? copy_mount_string+0x30/0x30 [ 2326.497401][ T7833] ? retain_dentry+0x275/0x360 [ 2326.502136][ T7833] ? copy_mount_options+0x59/0x320 [ 2326.507219][ T7833] ? copy_mount_options+0x293/0x320 [ 2326.512440][ T7833] ksys_mount+0xc2/0xf0 [ 2326.516570][ T7833] __x64_sys_mount+0xb1/0xc0 [ 2326.521157][ T7833] do_syscall_64+0xcb/0x150 [ 2326.525686][ T7833] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2326.531642][ T7833] RIP: 0033:0x4608aa [ 2326.535509][ T7833] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2326.555085][ T7833] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2326.563464][ T7833] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2326.571406][ T7833] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2326.579352][ T7833] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2326.587307][ T7833] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2326.595248][ T7833] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2326.604180][ T7833] EXT4-fs (loop4): Failed to create ea_block_cache 18:55:46 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x36b, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:46 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200017900000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x2000000000000000) 18:55:46 executing program 4 (fault-call:0 fault-nth:69): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x100000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:46 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040002200000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2326.775497][ T7822] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2326.787915][ T7822] EXT4-fs (loop3): get root inode failed [ 2326.794254][ T7822] EXT4-fs (loop3): mount failed 18:55:46 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040002500000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:46 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200007a00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2326.862635][ T7854] FAULT_INJECTION: forcing a failure. [ 2326.862635][ T7854] name failslab, interval 1, probability 0, space 0, times 0 [ 2326.876221][ T7853] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2326.888189][ T7854] CPU: 0 PID: 7854 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2326.898277][ T7854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2326.908379][ T7854] Call Trace: 18:55:46 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200028600000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:46 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200029200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:46 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200029e00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2326.911660][ T7854] dump_stack+0x1b0/0x21e [ 2326.915980][ T7854] ? devkmsg_release+0x11c/0x11c [ 2326.920909][ T7854] ? stack_trace_save+0x111/0x1e0 [ 2326.925915][ T7854] ? show_regs_print_info+0x12/0x12 [ 2326.931097][ T7854] ? stack_trace_snprint+0x150/0x150 [ 2326.936372][ T7854] ? mem_cgroup_charge_statistics+0x12a/0x7d0 [ 2326.942430][ T7854] should_fail+0x6fb/0x860 [ 2326.946832][ T7854] ? setup_fault_attr+0x2b0/0x2b0 [ 2326.951836][ T7854] ? __kasan_kmalloc+0x179/0x1b0 [ 2326.956758][ T7854] ? mem_cgroup_try_charge_delay+0x10/0x10 18:55:46 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200c0ed00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2326.962580][ T7854] ? __rcu_read_lock+0x50/0x50 [ 2326.967334][ T7854] ? kmem_cache_alloc+0x1d5/0x250 [ 2326.972339][ T7854] ? alloc_buffer_head+0x26/0x270 [ 2326.977351][ T7854] ? xas_load+0x468/0x4c0 [ 2326.981674][ T7854] ? mempool_alloc_slab+0x16/0x30 [ 2326.986680][ T7854] ? mempool_free+0x380/0x380 [ 2326.991340][ T7854] should_failslab+0x5/0x20 [ 2326.995843][ T7854] kmem_cache_alloc+0x36/0x250 [ 2327.000594][ T7854] ? mempool_free+0x380/0x380 [ 2327.005241][ T7854] mempool_alloc_slab+0x16/0x30 [ 2327.010081][ T7854] mempool_alloc+0x100/0x650 [ 2327.014678][ T7854] ? workingset_activation+0x150/0x150 [ 2327.020105][ T7854] ? mempool_resize+0x910/0x910 [ 2327.024955][ T7854] ? _raw_spin_lock+0xa1/0x170 [ 2327.029690][ T7854] ? _raw_spin_trylock_bh+0x190/0x190 [ 2327.035040][ T7854] ? add_to_page_cache_lru+0x20b/0x280 [ 2327.040481][ T7854] bio_alloc_bioset+0x1fc/0x660 [ 2327.045325][ T7854] ? bio_chain_endio+0xf0/0xf0 [ 2327.050059][ T7854] ? write_boundary_block+0x150/0x150 [ 2327.055413][ T7854] ? _raw_spin_lock+0xa1/0x170 [ 2327.060156][ T7854] submit_bh_wbc+0x1ba/0x790 [ 2327.064905][ T7854] ? __getblk_gfp+0x64a/0x750 [ 2327.069552][ T7854] ll_rw_block+0x1cb/0x230 [ 2327.073945][ T7854] __breadahead_gfp+0xc9/0x190 [ 2327.078718][ T7854] ? kvmalloc_node+0xc2/0x120 [ 2327.083366][ T7854] ? __breadahead+0x170/0x170 [ 2327.088057][ T7854] ? __kmalloc+0xf7/0x2c0 [ 2327.092360][ T7854] ext4_fill_super+0x609e/0xe890 [ 2327.097272][ T7854] ? ext4_mount+0x40/0x40 [ 2327.101573][ T7854] ? idr_replace+0x1aa/0x220 [ 2327.106135][ T7854] ? snprintf+0xc0/0x110 [ 2327.110348][ T7854] ? up_read+0x10/0x10 [ 2327.114391][ T7854] ? vscnprintf+0x80/0x80 [ 2327.118701][ T7854] mount_bdev+0x22d/0x340 [ 2327.123015][ T7854] ? ext4_mount+0x40/0x40 [ 2327.127322][ T7854] legacy_get_tree+0xde/0x170 [ 2327.132026][ T7854] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2327.137411][ T7854] vfs_get_tree+0x85/0x260 [ 2327.141820][ T7854] do_mount+0x1883/0x2630 [ 2327.146136][ T7854] ? setup_fault_attr+0x2b0/0x2b0 [ 2327.151130][ T7854] ? up_write+0xa1/0x190 [ 2327.155404][ T7854] ? setup_fault_attr+0x2b0/0x2b0 [ 2327.160406][ T7854] ? copy_mount_string+0x30/0x30 [ 2327.165334][ T7854] ? retain_dentry+0x275/0x360 [ 2327.170070][ T7854] ? copy_mount_options+0x59/0x320 [ 2327.175152][ T7854] ? copy_mount_options+0x293/0x320 [ 2327.180330][ T7854] ksys_mount+0xc2/0xf0 [ 2327.184471][ T7854] __x64_sys_mount+0xb1/0xc0 [ 2327.189031][ T7854] do_syscall_64+0xcb/0x150 [ 2327.193513][ T7854] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2327.199384][ T7854] RIP: 0033:0x4608aa [ 2327.203249][ T7854] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2327.222834][ T7854] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2327.231215][ T7854] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2327.239158][ T7854] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2327.247113][ T7854] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2327.255066][ T7854] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2327.263011][ T7854] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2327.340269][ T7868] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2327.352591][ T7868] EXT4-fs (loop3): get root inode failed [ 2327.358275][ T7868] EXT4-fs (loop3): mount failed 18:55:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x2400000000000000) 18:55:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3c1, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020003f700000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:47 executing program 4 (fault-call:0 fault-nth:70): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x200000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:47 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040cf2600000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2327.422518][ T7868] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2327.438440][ T7868] EXT4-fs (loop3): get root inode failed [ 2327.447788][ T7868] EXT4-fs (loop3): mount failed 18:55:47 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040fa2600000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020001fe00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x300000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2327.533769][ T7899] FAULT_INJECTION: forcing a failure. [ 2327.533769][ T7899] name failslab, interval 1, probability 0, space 0, times 0 [ 2327.548252][ T7899] CPU: 0 PID: 7899 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2327.558312][ T7899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2327.568351][ T7899] Call Trace: [ 2327.571629][ T7899] dump_stack+0x1b0/0x21e [ 2327.575939][ T7899] ? devkmsg_release+0x11c/0x11c [ 2327.580858][ T7899] ? __schedule+0x8ae/0xe30 [ 2327.585344][ T7899] ? show_regs_print_info+0x12/0x12 [ 2327.590523][ T7899] should_fail+0x6fb/0x860 [ 2327.594920][ T7899] ? setup_fault_attr+0x2b0/0x2b0 [ 2327.599941][ T7899] ? preempt_schedule_irq+0xc7/0x110 [ 2327.605203][ T7899] ? preempt_schedule_notrace+0x110/0x110 [ 2327.610900][ T7899] ? should_fail+0x182/0x860 [ 2327.615472][ T7899] ? prealloc_shrinker+0x50/0x210 [ 2327.620475][ T7899] should_failslab+0x5/0x20 [ 2327.624963][ T7899] kmem_cache_alloc_trace+0x39/0x270 [ 2327.630232][ T7899] ? retint_kernel+0x1b/0x1b [ 2327.634804][ T7899] prealloc_shrinker+0x50/0x210 [ 2327.639654][ T7899] register_shrinker+0x1a/0x170 [ 2327.644500][ T7899] mb_cache_create+0x244/0x3c0 [ 2327.649262][ T7899] ext4_fill_super+0x9333/0xe890 [ 2327.654186][ T7899] ? ext4_mount+0x40/0x40 [ 2327.658511][ T7899] ? idr_replace+0x1aa/0x220 [ 2327.663080][ T7899] ? snprintf+0xc0/0x110 [ 2327.667298][ T7899] ? up_read+0x10/0x10 [ 2327.671348][ T7899] ? vscnprintf+0x80/0x80 [ 2327.675660][ T7899] mount_bdev+0x22d/0x340 [ 2327.679969][ T7899] ? ext4_mount+0x40/0x40 [ 2327.684281][ T7899] legacy_get_tree+0xde/0x170 [ 2327.688934][ T7899] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2327.694281][ T7899] vfs_get_tree+0x85/0x260 [ 2327.698674][ T7899] do_mount+0x1883/0x2630 [ 2327.703004][ T7899] ? setup_fault_attr+0x2b0/0x2b0 [ 2327.708008][ T7899] ? up_write+0xa1/0x190 [ 2327.712245][ T7899] ? setup_fault_attr+0x2b0/0x2b0 [ 2327.717249][ T7899] ? copy_mount_string+0x30/0x30 [ 2327.722166][ T7899] ? retain_dentry+0x275/0x360 [ 2327.726906][ T7899] ? copy_mount_options+0x59/0x320 [ 2327.731999][ T7899] ? copy_mount_options+0x293/0x320 [ 2327.737174][ T7899] ksys_mount+0xc2/0xf0 [ 2327.741309][ T7899] __x64_sys_mount+0xb1/0xc0 [ 2327.745877][ T7899] do_syscall_64+0xcb/0x150 [ 2327.750372][ T7899] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2327.756240][ T7899] RIP: 0033:0x4608aa [ 2327.760144][ T7899] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2327.779732][ T7899] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2327.788124][ T7899] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2327.796083][ T7899] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2327.804048][ T7899] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2327.811998][ T7899] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2327.819948][ T7899] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:47 executing program 4 (fault-call:0 fault-nth:71): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000fff00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2327.831804][ T7899] EXT4-fs (loop4): Failed to create ea_block_cache [ 2327.847422][ T7904] EXT4-fs mount: 1 callbacks suppressed [ 2327.847434][ T7904] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000008000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2327.887001][ T7901] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2327.899134][ T7901] EXT4-fs (loop3): get root inode failed [ 2327.905182][ T7901] EXT4-fs (loop3): mount failed 18:55:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x4000000000000000) 18:55:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x402, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200400008000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:47 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000403c2700000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000040000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000010300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x400000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000020300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:47 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000030300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2328.143422][ T7926] FAULT_INJECTION: forcing a failure. [ 2328.143422][ T7926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2328.163925][ T7926] CPU: 1 PID: 7926 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2328.173996][ T7926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2328.184041][ T7926] Call Trace: [ 2328.187336][ T7926] dump_stack+0x1b0/0x21e [ 2328.191661][ T7926] ? devkmsg_release+0x11c/0x11c [ 2328.196600][ T7926] ? __kasan_kmalloc+0x179/0x1b0 [ 2328.201541][ T7926] ? show_regs_print_info+0x12/0x12 [ 2328.206734][ T7926] ? kmem_cache_alloc_trace+0xc3/0x270 [ 2328.212187][ T7926] ? prealloc_shrinker+0x50/0x210 [ 2328.217202][ T7926] ? register_shrinker+0x1a/0x170 [ 2328.222219][ T7926] ? ext4_fill_super+0x9333/0xe890 [ 2328.227324][ T7926] ? mount_bdev+0x22d/0x340 [ 2328.231832][ T7926] ? legacy_get_tree+0xde/0x170 [ 2328.236677][ T7926] ? vfs_get_tree+0x85/0x260 [ 2328.241257][ T7926] should_fail+0x6fb/0x860 [ 2328.245676][ T7926] ? setup_fault_attr+0x2b0/0x2b0 [ 2328.250675][ T7926] ? __x64_sys_mount+0xb1/0xc0 [ 2328.255426][ T7926] ? do_syscall_64+0xcb/0x150 [ 2328.260109][ T7926] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2328.266150][ T7926] __alloc_pages_nodemask+0x1ee/0x7c0 [ 2328.271498][ T7926] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2328.277032][ T7926] ? up_write+0xa1/0x190 [ 2328.281245][ T7926] ? down_write+0xd8/0x150 [ 2328.285633][ T7926] get_zeroed_page+0x15/0x40 [ 2328.290216][ T7926] ext4_calculate_overhead+0xc1/0x1010 [ 2328.295664][ T7926] ? register_shrinker+0x136/0x170 [ 2328.300750][ T7926] ? mb_cache_create+0x2a0/0x3c0 [ 2328.305668][ T7926] ext4_fill_super+0xa904/0xe890 [ 2328.310581][ T7926] ? ext4_mount+0x40/0x40 [ 2328.314890][ T7926] ? idr_replace+0x1aa/0x220 [ 2328.319450][ T7926] ? snprintf+0xc0/0x110 [ 2328.323670][ T7926] ? up_read+0x10/0x10 [ 2328.327708][ T7926] ? vscnprintf+0x80/0x80 [ 2328.332008][ T7926] mount_bdev+0x22d/0x340 [ 2328.336307][ T7926] ? ext4_mount+0x40/0x40 [ 2328.340621][ T7926] legacy_get_tree+0xde/0x170 [ 2328.345266][ T7926] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2328.350635][ T7926] vfs_get_tree+0x85/0x260 [ 2328.355021][ T7926] do_mount+0x1883/0x2630 [ 2328.359318][ T7926] ? _raw_spin_unlock+0x5/0x20 [ 2328.364066][ T7926] ? ___slab_alloc+0x297/0x450 [ 2328.368798][ T7926] ? copy_mount_string+0x30/0x30 [ 2328.373708][ T7926] ? copy_mount_options+0x59/0x320 [ 2328.378791][ T7926] ? copy_mount_options+0x293/0x320 [ 2328.383957][ T7926] ksys_mount+0xc2/0xf0 [ 2328.388082][ T7926] __x64_sys_mount+0xb1/0xc0 [ 2328.392642][ T7926] do_syscall_64+0xcb/0x150 [ 2328.397115][ T7926] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2328.402990][ T7926] RIP: 0033:0x4608aa [ 2328.406870][ T7926] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2328.426447][ T7926] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2328.434838][ T7926] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa 18:55:48 executing program 4 (fault-call:0 fault-nth:72): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:48 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000040300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:48 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040422700000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2328.442780][ T7926] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2328.450721][ T7926] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2328.458663][ T7926] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2328.466624][ T7926] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2328.574528][ T7948] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2328.597370][ T7954] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2328.608893][ T7948] EXT4-fs (loop3): get root inode failed [ 2328.616587][ T7948] EXT4-fs (loop3): mount failed [ 2328.624977][ T7965] FAULT_INJECTION: forcing a failure. [ 2328.624977][ T7965] name failslab, interval 1, probability 0, space 0, times 0 [ 2328.638005][ T7965] CPU: 1 PID: 7965 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2328.648056][ T7965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2328.658176][ T7965] Call Trace: [ 2328.661458][ T7965] dump_stack+0x1b0/0x21e [ 2328.665769][ T7965] ? devkmsg_release+0x11c/0x11c [ 2328.670684][ T7965] ? show_regs_print_info+0x12/0x12 [ 2328.675878][ T7965] ? register_shrinker+0x1a/0x170 [ 2328.680896][ T7965] ? kasan_alloc_pages+0x4a/0x60 [ 2328.685811][ T7965] ? prep_new_page+0x11a/0x380 [ 2328.690554][ T7965] should_fail+0x6fb/0x860 [ 2328.694951][ T7965] ? setup_fault_attr+0x2b0/0x2b0 [ 2328.699952][ T7965] ? alloc_workqueue+0x1b3/0x1200 [ 2328.704950][ T7965] should_failslab+0x5/0x20 [ 2328.709428][ T7965] kmem_cache_alloc_trace+0x39/0x270 [ 2328.714693][ T7965] ? alloc_workqueue+0x146/0x1200 [ 2328.719693][ T7965] alloc_workqueue+0x1b3/0x1200 [ 2328.724521][ T7965] ? ext4_bg_has_super+0xbb/0x3a0 [ 2328.729521][ T7965] ? ext4_bg_num_gdb+0x12c/0x200 [ 2328.734437][ T7965] ? ext4_fill_super+0xa90f/0xe890 [ 2328.739532][ T7965] ? apply_workqueue_attrs_locked+0x680/0x680 [ 2328.745579][ T7965] ext4_fill_super+0xa805/0xe890 [ 2328.750499][ T7965] ? ext4_mount+0x40/0x40 [ 2328.754806][ T7965] ? idr_replace+0x1aa/0x220 [ 2328.759377][ T7965] ? snprintf+0xc0/0x110 [ 2328.763599][ T7965] ? up_read+0x10/0x10 [ 2328.767647][ T7965] ? vscnprintf+0x80/0x80 [ 2328.771959][ T7965] mount_bdev+0x22d/0x340 [ 2328.776266][ T7965] ? ext4_mount+0x40/0x40 [ 2328.780587][ T7965] legacy_get_tree+0xde/0x170 [ 2328.785239][ T7965] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2328.790602][ T7965] vfs_get_tree+0x85/0x260 [ 2328.795258][ T7965] do_mount+0x1883/0x2630 [ 2328.799585][ T7965] ? copy_mount_string+0x30/0x30 [ 2328.804502][ T7965] ? copy_mount_options+0x1f8/0x320 [ 2328.809688][ T7965] ? copy_mount_options+0x230/0x320 [ 2328.814882][ T7965] ? __sanitizer_cov_trace_pc+0x45/0x50 [ 2328.820420][ T7965] ? copy_mount_options+0x293/0x320 [ 2328.825594][ T7965] ksys_mount+0xc2/0xf0 [ 2328.829727][ T7965] __x64_sys_mount+0xb1/0xc0 [ 2328.834295][ T7965] do_syscall_64+0xcb/0x150 [ 2328.838775][ T7965] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2328.844661][ T7965] RIP: 0033:0x4608aa [ 2328.848535][ T7965] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2328.868131][ T7965] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2328.876519][ T7965] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2328.884471][ T7965] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2328.892439][ T7965] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2328.900398][ T7965] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2328.908351][ T7965] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2328.917922][ T7965] EXT4-fs: failed to create workqueue 18:55:48 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x8000000000000000) [ 2328.923870][ T7965] EXT4-fs (loop4): mount failed [ 2328.997865][ T7948] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2329.009648][ T7948] EXT4-fs (loop3): get root inode failed [ 2329.015882][ T7948] EXT4-fs (loop3): mount failed 18:55:48 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x406, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:48 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000050300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x500000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:48 executing program 4 (fault-call:0 fault-nth:73): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:48 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040462700000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:48 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000060300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:48 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000070300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:48 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000080300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:48 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000090300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:48 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000000a0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:48 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040273c00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2329.241166][ T7983] FAULT_INJECTION: forcing a failure. [ 2329.241166][ T7983] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2329.255411][ T7983] CPU: 0 PID: 7983 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2329.265476][ T7983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2329.266672][ T7972] EXT4-fs: failed to create workqueue [ 2329.275517][ T7983] Call Trace: [ 2329.275536][ T7983] dump_stack+0x1b0/0x21e [ 2329.275547][ T7983] ? devkmsg_release+0x11c/0x11c [ 2329.275555][ T7983] ? __kasan_kmalloc+0x179/0x1b0 [ 2329.275572][ T7983] ? show_regs_print_info+0x12/0x12 [ 2329.290584][ T7972] EXT4-fs (loop5): mount failed [ 2329.293421][ T7983] ? kmem_cache_alloc_trace+0xc3/0x270 [ 2329.293431][ T7983] ? prealloc_shrinker+0x50/0x210 [ 2329.293438][ T7983] ? register_shrinker+0x1a/0x170 [ 2329.293447][ T7983] ? ext4_fill_super+0x9333/0xe890 [ 2329.293455][ T7983] ? mount_bdev+0x22d/0x340 [ 2329.293464][ T7983] ? legacy_get_tree+0xde/0x170 [ 2329.293481][ T7983] ? vfs_get_tree+0x85/0x260 [ 2329.342791][ T7983] should_fail+0x6fb/0x860 [ 2329.347214][ T7983] ? setup_fault_attr+0x2b0/0x2b0 [ 2329.352226][ T7983] ? __x64_sys_mount+0xb1/0xc0 [ 2329.356972][ T7983] ? do_syscall_64+0xcb/0x150 [ 2329.361629][ T7983] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2329.367786][ T7983] __alloc_pages_nodemask+0x1ee/0x7c0 [ 2329.373130][ T7983] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 2329.378663][ T7983] ? up_write+0xa1/0x190 [ 2329.382872][ T7983] ? down_write+0xd8/0x150 [ 2329.387255][ T7983] get_zeroed_page+0x15/0x40 [ 2329.391814][ T7983] ext4_calculate_overhead+0xc1/0x1010 [ 2329.397250][ T7983] ? register_shrinker+0x136/0x170 [ 2329.402365][ T7983] ? mb_cache_create+0x2a0/0x3c0 [ 2329.407284][ T7983] ext4_fill_super+0xa904/0xe890 [ 2329.412217][ T7983] ? ext4_mount+0x40/0x40 [ 2329.416517][ T7983] ? idr_replace+0x1aa/0x220 [ 2329.421089][ T7983] ? snprintf+0xc0/0x110 [ 2329.425312][ T7983] ? up_read+0x10/0x10 [ 2329.429346][ T7983] ? vscnprintf+0x80/0x80 [ 2329.433642][ T7983] mount_bdev+0x22d/0x340 [ 2329.437953][ T7983] ? ext4_mount+0x40/0x40 [ 2329.442249][ T7983] legacy_get_tree+0xde/0x170 [ 2329.446893][ T7983] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2329.452235][ T7983] vfs_get_tree+0x85/0x260 [ 2329.456636][ T7983] do_mount+0x1883/0x2630 [ 2329.460937][ T7983] ? setup_fault_attr+0x2b0/0x2b0 [ 2329.465943][ T7983] ? up_write+0xa1/0x190 [ 2329.470152][ T7983] ? setup_fault_attr+0x2b0/0x2b0 [ 2329.475142][ T7983] ? copy_mount_string+0x30/0x30 [ 2329.480055][ T7983] ? retain_dentry+0x275/0x360 [ 2329.484799][ T7983] ? copy_mount_options+0x59/0x320 [ 2329.489877][ T7983] ? copy_mount_options+0x293/0x320 [ 2329.495040][ T7983] ksys_mount+0xc2/0xf0 [ 2329.499162][ T7983] __x64_sys_mount+0xb1/0xc0 [ 2329.503720][ T7983] do_syscall_64+0xcb/0x150 [ 2329.508205][ T7983] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2329.514076][ T7983] RIP: 0033:0x4608aa [ 2329.517939][ T7983] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 18:55:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x8004000000000000) [ 2329.537530][ T7983] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2329.545936][ T7983] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2329.553909][ T7983] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2329.561856][ T7983] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2329.570065][ T7983] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2329.578006][ T7983] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2329.594867][ T7991] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2329.606724][ T7991] EXT4-fs (loop3): get root inode failed [ 2329.612417][ T7991] EXT4-fs (loop3): mount failed 18:55:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x500, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x600000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000000b0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:49 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040003f00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:49 executing program 4 (fault-call:0 fault-nth:74): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xa1ffffff00000000) 18:55:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000040b0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2329.766479][ T7991] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2329.780170][ T8007] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2329.782607][ T7991] EXT4-fs (loop3): get root inode failed [ 2329.796041][ T7991] EXT4-fs (loop3): mount failed 18:55:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000000c0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000000d0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000000e0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2329.887314][ T8019] FAULT_INJECTION: forcing a failure. [ 2329.887314][ T8019] name failslab, interval 1, probability 0, space 0, times 0 [ 2329.900280][ T8019] CPU: 0 PID: 8019 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2329.910336][ T8019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2329.920377][ T8019] Call Trace: [ 2329.923663][ T8019] dump_stack+0x1b0/0x21e [ 2329.927978][ T8019] ? devkmsg_release+0x11c/0x11c 18:55:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000100300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2329.932889][ T8019] ? show_regs_print_info+0x12/0x12 [ 2329.938074][ T8019] ? register_shrinker+0x1a/0x170 [ 2329.943082][ T8019] ? kasan_alloc_pages+0x4a/0x60 [ 2329.948009][ T8019] ? prep_new_page+0x11a/0x380 [ 2329.952767][ T8019] should_fail+0x6fb/0x860 [ 2329.957211][ T8019] ? setup_fault_attr+0x2b0/0x2b0 [ 2329.962221][ T8019] ? alloc_workqueue+0x146/0x1200 [ 2329.967228][ T8019] should_failslab+0x5/0x20 [ 2329.971732][ T8019] __kmalloc+0x5f/0x2c0 [ 2329.975876][ T8019] ? free_unref_page_commit+0xff/0x380 [ 2329.981327][ T8019] alloc_workqueue+0x146/0x1200 [ 2329.986161][ T8019] ? ext4_bg_has_super+0xbb/0x3a0 [ 2329.991165][ T8019] ? ext4_bg_num_gdb+0x12c/0x200 [ 2329.996092][ T8019] ? ext4_fill_super+0xa90f/0xe890 [ 2330.001175][ T8019] ? apply_workqueue_attrs_locked+0x680/0x680 [ 2330.007237][ T8019] ext4_fill_super+0xa805/0xe890 [ 2330.012151][ T8019] ? ext4_mount+0x40/0x40 [ 2330.016460][ T8019] ? idr_replace+0x1aa/0x220 [ 2330.021036][ T8019] ? snprintf+0xc0/0x110 [ 2330.025250][ T8019] ? up_read+0x10/0x10 [ 2330.029289][ T8019] ? vscnprintf+0x80/0x80 [ 2330.033590][ T8019] mount_bdev+0x22d/0x340 [ 2330.037907][ T8019] ? ext4_mount+0x40/0x40 [ 2330.042218][ T8019] legacy_get_tree+0xde/0x170 [ 2330.046862][ T8019] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2330.052213][ T8019] vfs_get_tree+0x85/0x260 [ 2330.056602][ T8019] do_mount+0x1883/0x2630 [ 2330.060904][ T8019] ? _raw_spin_unlock+0x5/0x20 [ 2330.065667][ T8019] ? ___slab_alloc+0x297/0x450 [ 2330.070407][ T8019] ? copy_mount_string+0x30/0x30 [ 2330.075325][ T8019] ? copy_mount_options+0x59/0x320 [ 2330.080419][ T8019] ? copy_mount_options+0x293/0x320 18:55:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000110300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2330.085588][ T8019] ksys_mount+0xc2/0xf0 [ 2330.089716][ T8019] __x64_sys_mount+0xb1/0xc0 [ 2330.094275][ T8019] do_syscall_64+0xcb/0x150 [ 2330.098748][ T8019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2330.104613][ T8019] RIP: 0033:0x4608aa [ 2330.108480][ T8019] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2330.128087][ T8019] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2330.136491][ T8019] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2330.144452][ T8019] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2330.152416][ T8019] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2330.160371][ T8019] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2330.168313][ T8019] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2330.177602][ T8019] EXT4-fs: failed to create workqueue [ 2330.183034][ T8019] EXT4-fs (loop4): mount failed [ 2330.247220][ T8028] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2330.259716][ T8028] EXT4-fs (loop3): get root inode failed [ 2330.265646][ T8028] EXT4-fs (loop3): mount failed [ 2330.287389][ T8043] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2330.305759][ T8028] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2330.317604][ T8028] EXT4-fs (loop3): get root inode failed [ 2330.326248][ T8028] EXT4-fs (loop3): mount failed 18:55:49 executing program 4 (fault-call:0 fault-nth:75): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:49 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000120300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:49 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040004000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:49 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x600, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x700000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xe4ffffff00000000) 18:55:50 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040274200000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000180300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000001f0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:50 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040274600000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2330.458693][ T8061] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2330.470824][ T8061] EXT4-fs (loop3): get root inode failed [ 2330.476646][ T8061] EXT4-fs (loop3): mount failed 18:55:50 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x604, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000200300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2330.498880][ T8059] FAULT_INJECTION: forcing a failure. [ 2330.498880][ T8059] name failslab, interval 1, probability 0, space 0, times 0 [ 2330.527327][ T8059] CPU: 1 PID: 8059 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2330.537436][ T8059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2330.547466][ T8059] Call Trace: [ 2330.550755][ T8059] dump_stack+0x1b0/0x21e [ 2330.555058][ T8059] ? devkmsg_release+0x11c/0x11c [ 2330.559967][ T8059] ? unwind_get_return_address+0x48/0x90 [ 2330.565589][ T8059] ? show_regs_print_info+0x12/0x12 [ 2330.570758][ T8059] ? arch_stack_walk+0x98/0xe0 [ 2330.575506][ T8059] should_fail+0x6fb/0x860 [ 2330.579896][ T8059] ? setup_fault_attr+0x2b0/0x2b0 [ 2330.584890][ T8059] ? stack_trace_snprint+0x150/0x150 [ 2330.590148][ T8059] ? arch_stack_walk+0x98/0xe0 [ 2330.594885][ T8059] ? apply_wqattrs_prepare+0x114/0x1500 [ 2330.600402][ T8059] should_failslab+0x5/0x20 [ 2330.604877][ T8059] kmem_cache_alloc_trace+0x39/0x270 [ 2330.610130][ T8059] apply_wqattrs_prepare+0x114/0x1500 [ 2330.615470][ T8059] ? __kasan_kmalloc+0x117/0x1b0 [ 2330.620396][ T8059] ? kmem_cache_alloc_trace+0xc3/0x270 [ 2330.625837][ T8059] ? alloc_workqueue+0x1b3/0x1200 [ 2330.630913][ T8059] ? ext4_fill_super+0xa805/0xe890 [ 2330.635996][ T8059] ? mount_bdev+0x22d/0x340 [ 2330.640469][ T8059] ? legacy_get_tree+0xde/0x170 [ 2330.645294][ T8059] ? do_mount+0x1883/0x2630 [ 2330.649766][ T8059] ? ksys_mount+0xc2/0xf0 [ 2330.654065][ T8059] ? __x64_sys_mount+0xb1/0xc0 [ 2330.658798][ T8059] ? do_syscall_64+0xcb/0x150 [ 2330.663443][ T8059] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2330.669488][ T8059] ? stack_trace_snprint+0x150/0x150 [ 2330.674758][ T8059] ? format_decode+0x441/0x1ab0 [ 2330.679578][ T8059] ? cwt_wakefn+0x70/0x70 [ 2330.683891][ T8059] ? vsnprintf+0x1c50/0x1c50 [ 2330.688487][ T8059] ? prep_new_page+0x11a/0x380 [ 2330.693235][ T8059] ? vsnprintf+0x1e9/0x1c50 [ 2330.697726][ T8059] apply_workqueue_attrs_locked+0x135/0x680 [ 2330.703590][ T8059] ? apply_workqueue_attrs+0x40/0x40 [ 2330.708843][ T8059] ? mutex_lock+0xa6/0x110 [ 2330.713229][ T8059] ? mutex_trylock+0xb0/0xb0 [ 2330.717786][ T8059] ? alloc_workqueue+0x1b3/0x1200 [ 2330.722779][ T8059] ? alloc_workqueue+0x146/0x1200 [ 2330.727772][ T8059] alloc_workqueue+0xce0/0x1200 [ 2330.732595][ T8059] ? ext4_fill_super+0xa90f/0xe890 [ 2330.737688][ T8059] ? apply_workqueue_attrs_locked+0x680/0x680 [ 2330.743752][ T8059] ext4_fill_super+0xa805/0xe890 [ 2330.748678][ T8059] ? ext4_mount+0x40/0x40 [ 2330.752982][ T8059] ? idr_replace+0x1aa/0x220 [ 2330.757543][ T8059] ? snprintf+0xc0/0x110 [ 2330.761754][ T8059] ? up_read+0x10/0x10 [ 2330.765807][ T8059] ? vscnprintf+0x80/0x80 [ 2330.770106][ T8059] mount_bdev+0x22d/0x340 [ 2330.774405][ T8059] ? ext4_mount+0x40/0x40 [ 2330.778704][ T8059] legacy_get_tree+0xde/0x170 [ 2330.783364][ T8059] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2330.788707][ T8059] vfs_get_tree+0x85/0x260 [ 2330.793095][ T8059] do_mount+0x1883/0x2630 [ 2330.797407][ T8059] ? _raw_spin_unlock+0x5/0x20 [ 2330.802144][ T8059] ? ___slab_alloc+0x297/0x450 [ 2330.806893][ T8059] ? copy_mount_string+0x30/0x30 [ 2330.811797][ T8059] ? copy_mount_options+0x59/0x320 [ 2330.816876][ T8059] ? copy_mount_options+0x293/0x320 [ 2330.822043][ T8059] ksys_mount+0xc2/0xf0 [ 2330.826192][ T8059] __x64_sys_mount+0xb1/0xc0 [ 2330.830756][ T8059] do_syscall_64+0xcb/0x150 [ 2330.835238][ T8059] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2330.841109][ T8059] RIP: 0033:0x4608aa [ 2330.844970][ T8059] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2330.864559][ T8059] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2330.873041][ T8059] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2330.880981][ T8059] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2330.888936][ T8059] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2330.896904][ T8059] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2330.904874][ T8059] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2330.914863][ T8064] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2330.924596][ T8059] EXT4-fs: failed to create workqueue [ 2330.930646][ T8059] EXT4-fs (loop4): mount failed 18:55:50 executing program 4 (fault-call:0 fault-nth:76): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x800000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:50 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040004800000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xf6ffffff00000000) 18:55:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000010200300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000220300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000250300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000027250300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:50 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000003f0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2331.101843][ T8084] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2331.117006][ T8084] EXT4-fs (loop3): get root inode failed [ 2331.123201][ T8084] EXT4-fs (loop3): mount failed [ 2331.130004][ T8093] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:55:50 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040004c00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2331.215866][ T8107] FAULT_INJECTION: forcing a failure. [ 2331.215866][ T8107] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.228997][ T8107] CPU: 0 PID: 8107 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2331.239056][ T8107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2331.249101][ T8107] Call Trace: [ 2331.252390][ T8107] dump_stack+0x1b0/0x21e [ 2331.256717][ T8107] ? devkmsg_release+0x11c/0x11c [ 2331.261647][ T8107] ? unwind_get_return_address+0x48/0x90 [ 2331.267273][ T8107] ? show_regs_print_info+0x12/0x12 [ 2331.272465][ T8107] ? arch_stack_walk+0x98/0xe0 [ 2331.277218][ T8107] should_fail+0x6fb/0x860 [ 2331.281617][ T8107] ? setup_fault_attr+0x2b0/0x2b0 [ 2331.286636][ T8107] ? stack_trace_snprint+0x150/0x150 [ 2331.291935][ T8107] ? arch_stack_walk+0x98/0xe0 [ 2331.296713][ T8107] ? apply_wqattrs_prepare+0x1c0/0x1500 [ 2331.302252][ T8107] should_failslab+0x5/0x20 [ 2331.306751][ T8107] kmem_cache_alloc_trace+0x39/0x270 [ 2331.312033][ T8107] apply_wqattrs_prepare+0x1c0/0x1500 [ 2331.317390][ T8107] ? __kasan_kmalloc+0x117/0x1b0 [ 2331.322309][ T8107] ? alloc_workqueue+0x1b3/0x1200 [ 2331.327323][ T8107] ? ext4_fill_super+0xa805/0xe890 [ 2331.332414][ T8107] ? mount_bdev+0x22d/0x340 [ 2331.336889][ T8107] ? legacy_get_tree+0xde/0x170 [ 2331.341714][ T8107] ? do_mount+0x1883/0x2630 [ 2331.346196][ T8107] ? ksys_mount+0xc2/0xf0 [ 2331.350493][ T8107] ? __x64_sys_mount+0xb1/0xc0 [ 2331.355227][ T8107] ? do_syscall_64+0xcb/0x150 [ 2331.359874][ T8107] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2331.365915][ T8107] ? stack_trace_snprint+0x150/0x150 [ 2331.371175][ T8107] ? format_decode+0x441/0x1ab0 [ 2331.375995][ T8107] ? cwt_wakefn+0x70/0x70 [ 2331.380295][ T8107] ? vsnprintf+0x1c50/0x1c50 [ 2331.384858][ T8107] ? prep_new_page+0x11a/0x380 [ 2331.389597][ T8107] ? vsnprintf+0x1e9/0x1c50 [ 2331.394086][ T8107] apply_workqueue_attrs_locked+0x135/0x680 [ 2331.399951][ T8107] ? apply_workqueue_attrs+0x40/0x40 [ 2331.405204][ T8107] ? mutex_lock+0xa6/0x110 [ 2331.409588][ T8107] ? mutex_trylock+0xb0/0xb0 [ 2331.414147][ T8107] ? alloc_workqueue+0x1b3/0x1200 [ 2331.419155][ T8107] ? alloc_workqueue+0x146/0x1200 [ 2331.424176][ T8107] alloc_workqueue+0xce0/0x1200 [ 2331.428996][ T8107] ? ext4_fill_super+0xa90f/0xe890 [ 2331.434075][ T8107] ? apply_workqueue_attrs_locked+0x680/0x680 [ 2331.440110][ T8107] ext4_fill_super+0xa805/0xe890 [ 2331.445057][ T8107] ? ext4_mount+0x40/0x40 [ 2331.449368][ T8107] ? idr_replace+0x1aa/0x220 [ 2331.453929][ T8107] ? snprintf+0xc0/0x110 [ 2331.458159][ T8107] ? up_read+0x10/0x10 [ 2331.462204][ T8107] ? vscnprintf+0x80/0x80 [ 2331.466506][ T8107] mount_bdev+0x22d/0x340 [ 2331.470821][ T8107] ? ext4_mount+0x40/0x40 [ 2331.475121][ T8107] legacy_get_tree+0xde/0x170 [ 2331.479781][ T8107] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2331.485129][ T8107] vfs_get_tree+0x85/0x260 [ 2331.489516][ T8107] do_mount+0x1883/0x2630 [ 2331.493817][ T8107] ? setup_fault_attr+0x2b0/0x2b0 [ 2331.498809][ T8107] ? up_write+0xa1/0x190 [ 2331.503021][ T8107] ? setup_fault_attr+0x2b0/0x2b0 [ 2331.508013][ T8107] ? copy_mount_string+0x30/0x30 [ 2331.512916][ T8107] ? retain_dentry+0x275/0x360 [ 2331.517649][ T8107] ? copy_mount_options+0x59/0x320 [ 2331.522745][ T8107] ? copy_mount_options+0x293/0x320 [ 2331.527927][ T8107] ksys_mount+0xc2/0xf0 [ 2331.532138][ T8107] __x64_sys_mount+0xb1/0xc0 [ 2331.536702][ T8107] do_syscall_64+0xcb/0x150 [ 2331.541190][ T8107] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2331.547051][ T8107] RIP: 0033:0x4608aa [ 2331.550915][ T8107] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2331.570492][ T8107] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2331.578891][ T8107] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2331.586837][ T8107] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2331.594782][ T8107] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2331.602724][ T8107] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 18:55:51 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x700, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xfeffffff00000000) [ 2331.610664][ T8107] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2331.621406][ T8084] EXT4-fs: failed to create workqueue [ 2331.627021][ T8084] EXT4-fs (loop3): mount failed [ 2331.642788][ T8107] EXT4-fs: failed to create workqueue [ 2331.648686][ T8107] EXT4-fs (loop4): mount failed 18:55:51 executing program 4 (fault-call:0 fault-nth:77): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x900000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:51 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040045f00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:51 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000400300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:51 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000800400300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:51 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004400300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:51 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004410300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:51 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004420300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2331.810115][ T8123] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2331.839147][ T8123] EXT4-fs (loop3): get root inode failed [ 2331.846178][ T8123] EXT4-fs (loop3): mount failed 18:55:51 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004430300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xa00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2331.953884][ T8131] FAULT_INJECTION: forcing a failure. [ 2331.953884][ T8131] name failslab, interval 1, probability 0, space 0, times 0 [ 2331.968041][ T8131] CPU: 1 PID: 8131 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2331.978098][ T8131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2331.988130][ T8131] Call Trace: [ 2331.991412][ T8131] dump_stack+0x1b0/0x21e [ 2331.995722][ T8131] ? devkmsg_release+0x11c/0x11c [ 2332.000639][ T8131] ? unwind_get_return_address+0x48/0x90 [ 2332.006248][ T8131] ? show_regs_print_info+0x12/0x12 [ 2332.011435][ T8131] ? arch_stack_walk+0x98/0xe0 [ 2332.016234][ T8131] should_fail+0x6fb/0x860 [ 2332.020661][ T8131] ? setup_fault_attr+0x2b0/0x2b0 [ 2332.025660][ T8131] ? stack_trace_snprint+0x150/0x150 [ 2332.030919][ T8131] ? arch_stack_walk+0x98/0xe0 [ 2332.035663][ T8131] ? apply_wqattrs_prepare+0x8ba/0x1500 [ 2332.041202][ T8131] should_failslab+0x5/0x20 [ 2332.045686][ T8131] kmem_cache_alloc+0x36/0x250 [ 2332.050427][ T8131] apply_wqattrs_prepare+0x8ba/0x1500 [ 2332.055774][ T8131] ? __kasan_kmalloc+0x117/0x1b0 [ 2332.060695][ T8131] ? __x64_sys_mount+0xb1/0xc0 [ 2332.065439][ T8131] ? format_decode+0x441/0x1ab0 [ 2332.070267][ T8131] ? cwt_wakefn+0x70/0x70 [ 2332.074610][ T8131] ? vsnprintf+0x1c50/0x1c50 [ 2332.079184][ T8131] ? prep_new_page+0x11a/0x380 [ 2332.083949][ T8131] ? vsnprintf+0x1e9/0x1c50 [ 2332.088450][ T8131] apply_workqueue_attrs_locked+0x135/0x680 [ 2332.094327][ T8131] ? apply_workqueue_attrs+0x40/0x40 [ 2332.099596][ T8131] ? mutex_lock+0xa6/0x110 [ 2332.103996][ T8131] ? mutex_trylock+0xb0/0xb0 [ 2332.108589][ T8131] ? alloc_workqueue+0x1b3/0x1200 [ 2332.113593][ T8131] ? alloc_workqueue+0x146/0x1200 [ 2332.118596][ T8131] alloc_workqueue+0xce0/0x1200 [ 2332.123432][ T8131] ? ext4_fill_super+0xa90f/0xe890 [ 2332.128535][ T8131] ? apply_workqueue_attrs_locked+0x680/0x680 [ 2332.134586][ T8131] ext4_fill_super+0xa805/0xe890 [ 2332.139510][ T8131] ? ext4_mount+0x40/0x40 [ 2332.143818][ T8131] ? idr_replace+0x1aa/0x220 [ 2332.148384][ T8131] ? snprintf+0xc0/0x110 [ 2332.152608][ T8131] ? up_read+0x10/0x10 [ 2332.156654][ T8131] ? vscnprintf+0x80/0x80 [ 2332.160962][ T8131] mount_bdev+0x22d/0x340 [ 2332.165268][ T8131] ? ext4_mount+0x40/0x40 [ 2332.169580][ T8131] legacy_get_tree+0xde/0x170 [ 2332.174234][ T8131] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2332.179587][ T8131] vfs_get_tree+0x85/0x260 [ 2332.183984][ T8131] do_mount+0x1883/0x2630 [ 2332.188295][ T8131] ? setup_fault_attr+0x2b0/0x2b0 [ 2332.193318][ T8131] ? up_write+0xa1/0x190 [ 2332.197541][ T8131] ? ___slab_alloc+0x9b/0x450 [ 2332.202205][ T8131] ? copy_mount_string+0x30/0x30 [ 2332.207128][ T8131] ? retain_dentry+0x275/0x360 [ 2332.211879][ T8131] ? copy_mount_options+0x59/0x320 [ 2332.216984][ T8131] ? copy_mount_options+0x293/0x320 [ 2332.222178][ T8131] ksys_mount+0xc2/0xf0 [ 2332.226329][ T8131] __x64_sys_mount+0xb1/0xc0 [ 2332.230912][ T8131] do_syscall_64+0xcb/0x150 [ 2332.235430][ T8131] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2332.241324][ T8131] RIP: 0033:0x4608aa [ 2332.245205][ T8131] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2332.264797][ T8131] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2332.273194][ T8131] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2332.281147][ T8131] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2332.289096][ T8131] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2332.297046][ T8131] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2332.305001][ T8131] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2332.318481][ T8131] EXT4-fs: failed to create workqueue [ 2332.324150][ T8116] EXT4-fs: failed to create workqueue [ 2332.329519][ T8116] EXT4-fs (loop5): mount failed [ 2332.336182][ T8131] EXT4-fs (loop4): mount failed [ 2332.343352][ T8123] EXT4-fs: failed to create workqueue [ 2332.348791][ T8123] EXT4-fs (loop3): mount failed 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004440300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x900, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:52 executing program 4 (fault-call:0 fault-nth:78): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xff0f000000000000) 18:55:52 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040006000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004450300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xb00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004460300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004470300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040046000000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000480300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xc00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffefffff00000000) [ 2332.636047][ T8167] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2332.650900][ T8165] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2332.693237][ T8169] FAULT_INJECTION: forcing a failure. [ 2332.693237][ T8169] name failslab, interval 1, probability 0, space 0, times 0 [ 2332.708199][ T8165] EXT4-fs (loop3): get root inode failed [ 2332.714778][ T8165] EXT4-fs (loop3): mount failed [ 2332.737009][ T8169] CPU: 1 PID: 8169 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2332.747076][ T8169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2332.757141][ T8169] Call Trace: [ 2332.760414][ T8169] dump_stack+0x1b0/0x21e [ 2332.764717][ T8169] ? devkmsg_release+0x11c/0x11c [ 2332.769628][ T8169] ? show_regs_print_info+0x12/0x12 [ 2332.774813][ T8169] ? slab_free_freelist_hook+0xd0/0x150 [ 2332.780336][ T8169] ? apply_workqueue_attrs_locked+0x330/0x680 [ 2332.786382][ T8169] should_fail+0x6fb/0x860 [ 2332.790770][ T8169] ? setup_fault_attr+0x2b0/0x2b0 [ 2332.795763][ T8169] ? apply_workqueue_attrs_locked+0x330/0x680 [ 2332.801798][ T8169] ? init_rescuer+0x89/0x2a0 [ 2332.806372][ T8169] should_failslab+0x5/0x20 [ 2332.810850][ T8169] kmem_cache_alloc_trace+0x39/0x270 [ 2332.816111][ T8169] ? mutex_trylock+0xb0/0xb0 [ 2332.820679][ T8169] ? alloc_workqueue+0x1b3/0x1200 [ 2332.825691][ T8169] init_rescuer+0x89/0x2a0 [ 2332.830096][ T8169] alloc_workqueue+0xd3b/0x1200 [ 2332.834929][ T8169] ? ext4_fill_super+0xa90f/0xe890 [ 2332.840018][ T8169] ? apply_workqueue_attrs_locked+0x680/0x680 [ 2332.846063][ T8169] ext4_fill_super+0xa805/0xe890 [ 2332.850984][ T8169] ? ext4_mount+0x40/0x40 [ 2332.855291][ T8169] ? idr_replace+0x1aa/0x220 [ 2332.859858][ T8169] ? snprintf+0xc0/0x110 [ 2332.864079][ T8169] ? up_read+0x10/0x10 [ 2332.868126][ T8169] ? vscnprintf+0x80/0x80 [ 2332.872468][ T8169] mount_bdev+0x22d/0x340 [ 2332.876790][ T8169] ? ext4_mount+0x40/0x40 [ 2332.881110][ T8169] legacy_get_tree+0xde/0x170 [ 2332.885801][ T8169] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2332.891156][ T8169] vfs_get_tree+0x85/0x260 [ 2332.895563][ T8169] do_mount+0x1883/0x2630 [ 2332.899874][ T8169] ? setup_fault_attr+0x2b0/0x2b0 [ 2332.904876][ T8169] ? up_write+0xa1/0x190 [ 2332.909094][ T8169] ? ___slab_alloc+0x9b/0x450 [ 2332.913748][ T8169] ? copy_mount_string+0x30/0x30 [ 2332.918660][ T8169] ? retain_dentry+0x275/0x360 [ 2332.923400][ T8169] ? copy_mount_options+0x59/0x320 [ 2332.928488][ T8169] ? copy_mount_options+0x293/0x320 [ 2332.933663][ T8169] ksys_mount+0xc2/0xf0 [ 2332.937798][ T8169] __x64_sys_mount+0xb1/0xc0 [ 2332.942366][ T8169] do_syscall_64+0xcb/0x150 [ 2332.946846][ T8169] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2332.952723][ T8169] RIP: 0033:0x4608aa [ 2332.956605][ T8169] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2332.976207][ T8169] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2332.984605][ T8169] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2332.992560][ T8169] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2333.000515][ T8169] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2333.008474][ T8169] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2333.016449][ T8169] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2333.045165][ T8169] EXT4-fs: failed to create workqueue [ 2333.051136][ T8169] EXT4-fs (loop4): mount failed 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004480300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xa00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xd00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:52 executing program 4 (fault-call:0 fault-nth:79): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffffff7f00000000) 18:55:52 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040046100000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2333.190692][ T8186] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2333.202556][ T8165] EXT4-fs: failed to create workqueue [ 2333.207931][ T8165] EXT4-fs (loop3): mount failed 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000004490300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000044a0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000044b0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000004c0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000044c0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000600300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:52 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040036700000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2333.368152][ T8196] FAULT_INJECTION: forcing a failure. [ 2333.368152][ T8196] name failslab, interval 1, probability 0, space 0, times 0 [ 2333.381617][ T8196] CPU: 0 PID: 8196 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2333.391675][ T8196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2333.401712][ T8196] Call Trace: [ 2333.404977][ T8196] dump_stack+0x1b0/0x21e [ 2333.409276][ T8196] ? devkmsg_release+0x11c/0x11c [ 2333.414198][ T8196] ? show_regs_print_info+0x12/0x12 [ 2333.419366][ T8196] ? slab_free_freelist_hook+0xd0/0x150 [ 2333.424880][ T8196] ? apply_workqueue_attrs_locked+0x330/0x680 [ 2333.430939][ T8196] should_fail+0x6fb/0x860 [ 2333.435344][ T8196] ? setup_fault_attr+0x2b0/0x2b0 [ 2333.440340][ T8196] ? apply_workqueue_attrs_locked+0x330/0x680 [ 2333.446376][ T8196] ? init_rescuer+0x89/0x2a0 [ 2333.450936][ T8196] should_failslab+0x5/0x20 [ 2333.455410][ T8196] kmem_cache_alloc_trace+0x39/0x270 [ 2333.460664][ T8196] ? mutex_trylock+0xb0/0xb0 [ 2333.465224][ T8196] ? alloc_workqueue+0x1b3/0x1200 [ 2333.470222][ T8196] init_rescuer+0x89/0x2a0 [ 2333.474627][ T8196] alloc_workqueue+0xd3b/0x1200 [ 2333.479495][ T8196] ? ext4_fill_super+0xa90f/0xe890 [ 2333.484586][ T8196] ? apply_workqueue_attrs_locked+0x680/0x680 [ 2333.490632][ T8196] ext4_fill_super+0xa805/0xe890 [ 2333.495550][ T8196] ? ext4_mount+0x40/0x40 [ 2333.499855][ T8196] ? idr_replace+0x1aa/0x220 [ 2333.504434][ T8196] ? snprintf+0xc0/0x110 [ 2333.508656][ T8196] ? up_read+0x10/0x10 [ 2333.512694][ T8196] ? vscnprintf+0x80/0x80 [ 2333.516992][ T8196] mount_bdev+0x22d/0x340 [ 2333.521290][ T8196] ? ext4_mount+0x40/0x40 [ 2333.525590][ T8196] legacy_get_tree+0xde/0x170 [ 2333.530236][ T8196] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2333.535575][ T8196] vfs_get_tree+0x85/0x260 [ 2333.539977][ T8196] do_mount+0x1883/0x2630 [ 2333.544300][ T8196] ? setup_fault_attr+0x2b0/0x2b0 [ 2333.549293][ T8196] ? up_write+0xa1/0x190 [ 2333.553518][ T8196] ? copy_mount_string+0x30/0x30 [ 2333.558444][ T8196] ? copy_mount_options+0x59/0x320 [ 2333.563531][ T8196] ? copy_mount_options+0x293/0x320 [ 2333.568699][ T8196] ksys_mount+0xc2/0xf0 [ 2333.572845][ T8196] __x64_sys_mount+0xb1/0xc0 [ 2333.577403][ T8196] do_syscall_64+0xcb/0x150 [ 2333.581878][ T8196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2333.587745][ T8196] RIP: 0033:0x4608aa [ 2333.591625][ T8196] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2333.611388][ T8196] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2333.619766][ T8196] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2333.627721][ T8196] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2333.635663][ T8196] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2333.643605][ T8196] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2333.651544][ T8196] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2333.662226][ T8196] EXT4-fs: failed to create workqueue [ 2333.667666][ T8196] EXT4-fs (loop4): mount failed [ 2333.735486][ T8217] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2333.747290][ T8217] EXT4-fs (loop3): get root inode failed [ 2333.753127][ T8217] EXT4-fs (loop3): mount failed [ 2333.846521][ T8216] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2333.859784][ T8217] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2333.871565][ T8217] EXT4-fs (loop3): get root inode failed [ 2333.881863][ T8217] EXT4-fs (loop3): mount failed 18:55:53 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xb00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:53 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000001610300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0xe00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:53 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040006800000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:53 executing program 4 (fault-call:0 fault-nth:80): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffffffff00000000) 18:55:53 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000680300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:53 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040036a00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:53 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000006c0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:53 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000016d0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2333.987085][ T8240] FAULT_INJECTION: forcing a failure. [ 2333.987085][ T8240] name failslab, interval 1, probability 0, space 0, times 0 [ 2334.001390][ T8240] CPU: 0 PID: 8240 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2334.011449][ T8240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2334.021492][ T8240] Call Trace: [ 2334.024779][ T8240] dump_stack+0x1b0/0x21e [ 2334.029106][ T8240] ? devkmsg_release+0x11c/0x11c [ 2334.034029][ T8240] ? show_regs_print_info+0x12/0x12 [ 2334.039311][ T8240] ? slab_free_freelist_hook+0xd0/0x150 [ 2334.044849][ T8240] ? apply_workqueue_attrs_locked+0x330/0x680 [ 2334.050916][ T8240] should_fail+0x6fb/0x860 [ 2334.055357][ T8240] ? setup_fault_attr+0x2b0/0x2b0 [ 2334.060377][ T8240] ? apply_workqueue_attrs_locked+0x330/0x680 [ 2334.066428][ T8240] ? init_rescuer+0x89/0x2a0 [ 2334.070988][ T8240] should_failslab+0x5/0x20 [ 2334.075616][ T8240] kmem_cache_alloc_trace+0x39/0x270 [ 2334.080903][ T8240] ? mutex_trylock+0xb0/0xb0 [ 2334.085525][ T8240] ? alloc_workqueue+0x1b3/0x1200 [ 2334.090581][ T8240] init_rescuer+0x89/0x2a0 [ 2334.095001][ T8240] alloc_workqueue+0xd3b/0x1200 [ 2334.099834][ T8240] ? ext4_fill_super+0xa90f/0xe890 [ 2334.104919][ T8240] ? apply_workqueue_attrs_locked+0x680/0x680 [ 2334.110959][ T8240] ext4_fill_super+0xa805/0xe890 [ 2334.115874][ T8240] ? ext4_mount+0x40/0x40 [ 2334.120174][ T8240] ? idr_replace+0x1aa/0x220 [ 2334.124736][ T8240] ? snprintf+0xc0/0x110 [ 2334.128954][ T8240] ? up_read+0x10/0x10 [ 2334.132995][ T8240] ? vscnprintf+0x80/0x80 [ 2334.137297][ T8240] mount_bdev+0x22d/0x340 [ 2334.141598][ T8240] ? ext4_mount+0x40/0x40 [ 2334.145919][ T8240] legacy_get_tree+0xde/0x170 [ 2334.150578][ T8240] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2334.156007][ T8240] vfs_get_tree+0x85/0x260 [ 2334.160401][ T8240] do_mount+0x1883/0x2630 [ 2334.164712][ T8240] ? setup_fault_attr+0x2b0/0x2b0 [ 2334.169707][ T8240] ? up_write+0xa1/0x190 [ 2334.173920][ T8240] ? ___slab_alloc+0x9b/0x450 [ 2334.178575][ T8240] ? copy_mount_string+0x30/0x30 [ 2334.183510][ T8240] ? retain_dentry+0x275/0x360 [ 2334.188256][ T8240] ? copy_mount_options+0x59/0x320 [ 2334.193340][ T8240] ? copy_mount_options+0x293/0x320 [ 2334.198524][ T8240] ksys_mount+0xc2/0xf0 [ 2334.202652][ T8240] __x64_sys_mount+0xb1/0xc0 [ 2334.207213][ T8240] do_syscall_64+0xcb/0x150 [ 2334.211704][ T8240] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2334.217570][ T8240] RIP: 0033:0x4608aa [ 2334.221441][ T8240] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2334.241019][ T8240] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2334.249412][ T8240] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2334.257373][ T8240] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2334.265338][ T8240] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2334.273282][ T8240] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 18:55:53 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000740300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:53 executing program 4 (fault-call:0 fault-nth:81): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2334.281224][ T8240] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2334.291391][ T8240] EXT4-fs: failed to create workqueue [ 2334.297324][ T8240] EXT4-fs (loop4): mount failed [ 2334.313947][ T8241] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2334.339575][ T8243] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2334.351478][ T8243] EXT4-fs (loop3): get root inode failed [ 2334.357855][ T8243] EXT4-fs (loop3): mount failed [ 2334.488438][ T8243] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2334.501114][ T8243] EXT4-fs (loop3): get root inode failed [ 2334.503527][ T8272] FAULT_INJECTION: forcing a failure. [ 2334.503527][ T8272] name failslab, interval 1, probability 0, space 0, times 0 [ 2334.507003][ T8243] EXT4-fs (loop3): mount failed [ 2334.525483][ T8272] CPU: 0 PID: 8272 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2334.535529][ T8272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2334.545557][ T8272] Call Trace: [ 2334.548826][ T8272] dump_stack+0x1b0/0x21e [ 2334.553137][ T8272] ? devkmsg_release+0x11c/0x11c [ 2334.558162][ T8272] ? show_regs_print_info+0x12/0x12 [ 2334.563335][ T8272] should_fail+0x6fb/0x860 [ 2334.567723][ T8272] ? setup_fault_attr+0x2b0/0x2b0 [ 2334.572714][ T8272] ? iget_locked+0x810/0x810 [ 2334.577272][ T8272] ? ext4_alloc_inode+0x1b/0x620 [ 2334.582180][ T8272] should_failslab+0x5/0x20 [ 2334.586663][ T8272] kmem_cache_alloc+0x36/0x250 [ 2334.591397][ T8272] ? set_qf_name+0x350/0x350 [ 2334.595952][ T8272] ext4_alloc_inode+0x1b/0x620 [ 2334.600697][ T8272] iget_locked+0x140/0x810 [ 2334.605084][ T8272] __ext4_iget+0x30c/0x48a0 [ 2334.609554][ T8272] ? mutex_unlock+0x19/0x40 [ 2334.614043][ T8272] ? ext4_get_projid+0x140/0x140 [ 2334.618957][ T8272] ? ext4_fill_super+0xa90f/0xe890 [ 2334.624046][ T8272] ? apply_workqueue_attrs_locked+0x680/0x680 [ 2334.630080][ T8272] ext4_fill_super+0xa8c8/0xe890 [ 2334.634988][ T8272] ? ext4_mount+0x40/0x40 [ 2334.639310][ T8272] ? idr_replace+0x1aa/0x220 [ 2334.643868][ T8272] ? snprintf+0xc0/0x110 [ 2334.648093][ T8272] ? up_read+0x10/0x10 [ 2334.652130][ T8272] ? vscnprintf+0x80/0x80 [ 2334.656429][ T8272] mount_bdev+0x22d/0x340 [ 2334.660739][ T8272] ? ext4_mount+0x40/0x40 [ 2334.665038][ T8272] legacy_get_tree+0xde/0x170 [ 2334.669685][ T8272] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2334.675026][ T8272] vfs_get_tree+0x85/0x260 [ 2334.679411][ T8272] do_mount+0x1883/0x2630 [ 2334.683728][ T8272] ? setup_fault_attr+0x2b0/0x2b0 [ 2334.688740][ T8272] ? up_write+0xa1/0x190 [ 2334.692954][ T8272] ? ___slab_alloc+0x9b/0x450 [ 2334.697602][ T8272] ? copy_mount_string+0x30/0x30 [ 2334.702507][ T8272] ? retain_dentry+0x275/0x360 [ 2334.707237][ T8272] ? copy_mount_options+0x59/0x320 [ 2334.712314][ T8272] ? copy_mount_options+0x293/0x320 [ 2334.717479][ T8272] ksys_mount+0xc2/0xf0 [ 2334.721607][ T8272] __x64_sys_mount+0xb1/0xc0 [ 2334.726171][ T8272] do_syscall_64+0xcb/0x150 [ 2334.730643][ T8272] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2334.736501][ T8272] RIP: 0033:0x4608aa [ 2334.740361][ T8272] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2334.759932][ T8272] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2334.768308][ T8272] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2334.776263][ T8272] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 18:55:54 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xc00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x1000000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:54 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000001790300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:54 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040036b00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0xffffffffffffffff) 18:55:54 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000007a0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2334.784203][ T8272] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2334.792147][ T8272] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2334.800085][ T8272] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2334.809462][ T8272] EXT4-fs (loop4): get root inode failed [ 2334.815150][ T8272] EXT4-fs (loop4): mount failed 18:55:54 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200f467207d0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:54 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000002860300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:54 executing program 4 (fault-call:0 fault-nth:82): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:54 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200ffffff8c0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:54 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000002920300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:54 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200ffffff970300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2335.078374][ T8289] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2335.094215][ T8315] FAULT_INJECTION: forcing a failure. [ 2335.094215][ T8315] name failslab, interval 1, probability 0, space 0, times 0 [ 2335.107458][ T8316] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2335.110064][ T8315] CPU: 1 PID: 8315 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2335.119178][ T8316] EXT4-fs (loop3): get root inode failed [ 2335.128950][ T8315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2335.128953][ T8315] Call Trace: [ 2335.128971][ T8315] dump_stack+0x1b0/0x21e [ 2335.128980][ T8315] ? devkmsg_release+0x11c/0x11c [ 2335.128994][ T8315] ? show_regs_print_info+0x12/0x12 [ 2335.137261][ T8316] EXT4-fs (loop3): mount failed [ 2335.144653][ T8315] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 2335.144665][ T8315] should_fail+0x6fb/0x860 [ 2335.144675][ T8315] ? setup_fault_attr+0x2b0/0x2b0 [ 2335.144690][ T8315] ? mempool_alloc_slab+0x25/0x30 [ 2335.186763][ T8315] ? mempool_alloc+0x10d/0x650 [ 2335.191505][ T8315] ? mempool_alloc_slab+0x16/0x30 [ 2335.196527][ T8315] ? mempool_free+0x380/0x380 [ 2335.201193][ T8315] should_failslab+0x5/0x20 [ 2335.205673][ T8315] kmem_cache_alloc+0x36/0x250 [ 2335.210418][ T8315] ? generic_make_request+0xd43/0xde0 [ 2335.215766][ T8315] ? mempool_free+0x380/0x380 [ 2335.220421][ T8315] mempool_alloc_slab+0x16/0x30 [ 2335.225246][ T8315] mempool_alloc+0x100/0x650 [ 2335.229814][ T8315] ? mempool_resize+0x910/0x910 [ 2335.234642][ T8315] ? submit_bio+0x11f/0x520 [ 2335.239174][ T8315] ? bio_add_page+0x2ea/0x470 [ 2335.243833][ T8315] bio_alloc_bioset+0x1fc/0x660 [ 2335.248676][ T8315] ? bio_chain_endio+0xf0/0xf0 [ 2335.253419][ T8315] ? ll_rw_block+0x211/0x230 [ 2335.257992][ T8315] submit_bh_wbc+0x1ba/0x790 [ 2335.262566][ T8315] submit_bh+0x21/0x30 [ 2335.266613][ T8315] __ext4_get_inode_loc+0xde3/0x1030 [ 2335.271878][ T8315] ? _raw_spin_lock+0xa1/0x170 [ 2335.276622][ T8315] ? ext4_get_inode_loc+0x60/0x60 [ 2335.281627][ T8315] ? inode_init_always+0x5be/0x800 [ 2335.286712][ T8315] ? _raw_spin_unlock+0x5/0x20 [ 2335.291454][ T8315] __ext4_iget+0x3ba/0x48a0 [ 2335.295948][ T8315] ? mutex_unlock+0x19/0x40 [ 2335.300441][ T8315] ? ext4_get_projid+0x140/0x140 [ 2335.305360][ T8315] ? ext4_fill_super+0xa90f/0xe890 [ 2335.310452][ T8315] ext4_fill_super+0xa8c8/0xe890 [ 2335.315370][ T8315] ? ext4_mount+0x40/0x40 [ 2335.319675][ T8315] ? idr_replace+0x1aa/0x220 [ 2335.324245][ T8315] ? snprintf+0xc0/0x110 [ 2335.328464][ T8315] ? up_read+0x10/0x10 [ 2335.332537][ T8315] ? vscnprintf+0x80/0x80 [ 2335.336874][ T8315] mount_bdev+0x22d/0x340 [ 2335.341178][ T8315] ? ext4_mount+0x40/0x40 [ 2335.345519][ T8315] legacy_get_tree+0xde/0x170 [ 2335.350187][ T8315] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2335.355533][ T8315] vfs_get_tree+0x85/0x260 [ 2335.359927][ T8315] do_mount+0x1883/0x2630 [ 2335.364235][ T8315] ? setup_fault_attr+0x2b0/0x2b0 [ 2335.369293][ T8315] ? up_write+0xa1/0x190 [ 2335.373554][ T8315] ? ___slab_alloc+0x9b/0x450 [ 2335.378215][ T8315] ? copy_mount_string+0x30/0x30 [ 2335.383159][ T8315] ? retain_dentry+0x275/0x360 [ 2335.387912][ T8315] ? copy_mount_options+0x59/0x320 [ 2335.393012][ T8315] ? copy_mount_options+0x293/0x320 [ 2335.398199][ T8315] ksys_mount+0xc2/0xf0 [ 2335.402334][ T8315] __x64_sys_mount+0xb1/0xc0 [ 2335.406915][ T8315] do_syscall_64+0xcb/0x150 [ 2335.411400][ T8315] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2335.417268][ T8315] RIP: 0033:0x4608aa [ 2335.421139][ T8315] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2335.440718][ T8315] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2335.449103][ T8315] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2335.457050][ T8315] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2335.465014][ T8315] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2335.472963][ T8315] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2335.480910][ T8315] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2335.496997][ T8315] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2335.588156][ T8316] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2335.599985][ T8316] EXT4-fs (loop3): get root inode failed [ 2335.605978][ T8316] EXT4-fs (loop3): mount failed 18:55:55 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040006c00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000029e0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x1100000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xd00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:55 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)='\x1e(\x12#\x00') add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) mount(&(0x7f0000000300)=@sg0='/dev/sg0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='autofs\x00', 0x0, &(0x7f00000003c0)='syz') openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 18:55:55 executing program 4 (fault-call:0 fault-nth:83): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02000000edc00300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02007d2067f40300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200fffffff60300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000003f70300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040007400000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x1200000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2335.753188][ T8335] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2335.793053][ T8336] FAULT_INJECTION: forcing a failure. [ 2335.793053][ T8336] name failslab, interval 1, probability 0, space 0, times 0 [ 2335.813274][ T8336] CPU: 0 PID: 8336 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2335.823343][ T8336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2335.833472][ T8336] Call Trace: [ 2335.836758][ T8336] dump_stack+0x1b0/0x21e [ 2335.841135][ T8336] ? devkmsg_release+0x11c/0x11c [ 2335.846068][ T8336] ? show_regs_print_info+0x12/0x12 [ 2335.851258][ T8336] ? blk_mq_requeue_work+0x9c0/0x9c0 [ 2335.856537][ T8336] should_fail+0x6fb/0x860 [ 2335.860949][ T8336] ? setup_fault_attr+0x2b0/0x2b0 [ 2335.865964][ T8336] ? mempool_alloc_slab+0x25/0x30 [ 2335.870977][ T8336] ? mempool_alloc+0x10d/0x650 [ 2335.875731][ T8336] ? mempool_alloc_slab+0x16/0x30 [ 2335.879109][ T8353] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2335.880743][ T8336] ? mempool_free+0x380/0x380 [ 2335.880752][ T8336] should_failslab+0x5/0x20 18:55:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x9, &(0x7f00000005c0)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f0000000000ec000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000100)="00000000000200e80000000000000000000000000000007371fe000000000000f82b3d13f4f6a7afc560043b2ec833189c60bc71c7ffc4e63227f2f19a527e31e18816f22307b5bb05d8b15d25ce2670bbf74e8ede97f4bec66e481442fa32ddf4366ef2b181dfd892741df5550fe41f03366c08e97af273fca2a4b74a23a74ea5863c4078aa49e8cad13c77ca20e0c9de90193f694ad538b39f7b2b45a3ebfcd93553deefc8569e10827162c3436ff871a776ccbdda88c508329c40181a649ffb05b370b0e10ce498f9699438475f6e62db563c4c", 0xd5, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000000400)="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", 0x1b9, 0x22100}, {&(0x7f0000000040)="ec7403a50f2fa7ddb59014a727bc8f08e37fc4fe016beb533854f60fb1", 0x1d, 0x1}, {&(0x7f00000002c0)="9ef1c606cc8b6d9f9d58c3e8ba96a131dcfbff49c304d0f28d79f1191085f53ca018a91822456e1940432dfa08541ddccee0d7c3539ca31cae3ac6a0b6137e540cb39e1166ae9ad4ccb5bbcc", 0x4c, 0x8}], 0x400, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x83) [ 2335.880768][ T8336] kmem_cache_alloc+0x36/0x250 [ 2335.892586][ T8353] EXT4-fs (loop3): get root inode failed [ 2335.896876][ T8336] ? generic_make_request+0xd43/0xde0 [ 2335.896886][ T8336] ? mempool_free+0x380/0x380 [ 2335.896899][ T8336] mempool_alloc_slab+0x16/0x30 [ 2335.901441][ T8353] EXT4-fs (loop3): mount failed [ 2335.906132][ T8336] mempool_alloc+0x100/0x650 [ 2335.906142][ T8336] ? mempool_resize+0x910/0x910 [ 2335.906151][ T8336] ? submit_bio+0x11f/0x520 [ 2335.906160][ T8336] ? bio_add_page+0x2ea/0x470 [ 2335.906169][ T8336] bio_alloc_bioset+0x1fc/0x660 [ 2335.906181][ T8336] ? bio_chain_endio+0xf0/0xf0 [ 2335.959562][ T8336] ? ll_rw_block+0x211/0x230 [ 2335.964152][ T8336] submit_bh_wbc+0x1ba/0x790 [ 2335.968725][ T8336] submit_bh+0x21/0x30 [ 2335.972766][ T8336] __ext4_get_inode_loc+0xde3/0x1030 [ 2335.978023][ T8336] ? _raw_spin_lock+0xa1/0x170 [ 2335.982763][ T8336] ? ext4_get_inode_loc+0x60/0x60 [ 2335.987756][ T8336] ? inode_init_always+0x5be/0x800 [ 2335.992835][ T8336] ? _raw_spin_unlock+0x5/0x20 [ 2335.997572][ T8336] __ext4_iget+0x3ba/0x48a0 [ 2336.002071][ T8336] ? mutex_unlock+0x19/0x40 [ 2336.006546][ T8336] ? ext4_get_projid+0x140/0x140 [ 2336.011460][ T8336] ? ext4_fill_super+0xa90f/0xe890 [ 2336.016561][ T8336] ext4_fill_super+0xa8c8/0xe890 [ 2336.021471][ T8336] ? ext4_mount+0x40/0x40 [ 2336.025776][ T8336] ? idr_replace+0x1aa/0x220 [ 2336.030344][ T8336] ? snprintf+0xc0/0x110 [ 2336.034561][ T8336] ? up_read+0x10/0x10 [ 2336.038630][ T8336] ? vscnprintf+0x80/0x80 [ 2336.042929][ T8336] mount_bdev+0x22d/0x340 [ 2336.047233][ T8336] ? ext4_mount+0x40/0x40 [ 2336.051540][ T8336] legacy_get_tree+0xde/0x170 [ 2336.056192][ T8336] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2336.061531][ T8336] vfs_get_tree+0x85/0x260 [ 2336.065926][ T8336] do_mount+0x1883/0x2630 [ 2336.070235][ T8336] ? _raw_spin_unlock+0x5/0x20 [ 2336.074983][ T8336] ? ___slab_alloc+0x297/0x450 [ 2336.079726][ T8336] ? copy_mount_string+0x30/0x30 [ 2336.084641][ T8336] ? copy_mount_options+0x59/0x320 [ 2336.089759][ T8336] ? copy_mount_options+0x293/0x320 [ 2336.094929][ T8336] ksys_mount+0xc2/0xf0 [ 2336.099072][ T8336] __x64_sys_mount+0xb1/0xc0 [ 2336.103633][ T8336] do_syscall_64+0xcb/0x150 [ 2336.108105][ T8336] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2336.113971][ T8336] RIP: 0033:0x4608aa [ 2336.117853][ T8336] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2336.137446][ T8336] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200fffffdf90300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200fffffdfd0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2336.145862][ T8336] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2336.155279][ T8336] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2336.163233][ T8336] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2336.171194][ T8336] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2336.179154][ T8336] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2336.190706][ T8336] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 18:55:55 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xde0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x1800000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200fffffffd0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 4 (fault-call:0 fault-nth:84): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:55 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040007a00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2336.277901][ T8353] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2336.289821][ T8353] EXT4-fs (loop3): get root inode failed [ 2336.296043][ T8353] EXT4-fs (loop3): mount failed 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000001fe0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000fff0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:55 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200f9fdffff0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2336.402496][ T8387] FAULT_INJECTION: forcing a failure. [ 2336.402496][ T8387] name failslab, interval 1, probability 0, space 0, times 0 [ 2336.412256][ T8386] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 2336.415219][ T8387] CPU: 0 PID: 8387 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2336.435299][ T8387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2336.445361][ T8387] Call Trace: [ 2336.448627][ T8387] dump_stack+0x1b0/0x21e [ 2336.452927][ T8387] ? devkmsg_release+0x11c/0x11c [ 2336.457834][ T8387] ? show_regs_print_info+0x12/0x12 [ 2336.463004][ T8387] ? unwind_get_return_address_ptr+0x130/0x130 [ 2336.469136][ T8387] should_fail+0x6fb/0x860 [ 2336.473522][ T8387] ? setup_fault_attr+0x2b0/0x2b0 [ 2336.478516][ T8387] ? __kernel_text_address+0x93/0x110 [ 2336.483862][ T8387] ? unwind_get_return_address+0x48/0x90 [ 2336.489479][ T8387] ? arch_stack_walk+0x98/0xe0 [ 2336.494341][ T8387] ? mempool_alloc_slab+0x16/0x30 [ 2336.499342][ T8387] ? mempool_free+0x380/0x380 [ 2336.503997][ T8387] should_failslab+0x5/0x20 [ 2336.508486][ T8387] kmem_cache_alloc+0x36/0x250 [ 2336.513220][ T8387] ? mempool_free+0x380/0x380 [ 2336.517866][ T8387] mempool_alloc_slab+0x16/0x30 [ 2336.522692][ T8387] mempool_alloc+0x100/0x650 [ 2336.527258][ T8387] ? __ext4_ext_check+0x959/0x1120 [ 2336.532337][ T8387] ? mempool_resize+0x910/0x910 [ 2336.537156][ T8387] ? chksum_update+0x41/0x90 [ 2336.541718][ T8387] ? crypto_shash_update+0x1e3/0x2b0 [ 2336.546987][ T8387] ? __kasan_kmalloc+0x117/0x1b0 [ 2336.551897][ T8387] ? kmem_cache_alloc+0x1d5/0x250 [ 2336.556915][ T8387] ? __d_alloc+0x2a/0x6b0 [ 2336.561213][ T8387] ? mount_bdev+0x22d/0x340 [ 2336.565685][ T8387] ? vfs_get_tree+0x85/0x260 [ 2336.570246][ T8387] bio_alloc_bioset+0x1fc/0x660 [ 2336.575080][ T8387] ? bio_chain_endio+0xf0/0xf0 [ 2336.579819][ T8387] ? __xa_set_mark+0x3fa/0x4c0 [ 2336.584553][ T8387] submit_bh_wbc+0x1ba/0x790 [ 2336.589128][ T8387] ? __wake_up_bit+0x170/0x170 [ 2336.593875][ T8387] ? inode_io_list_move_locked+0x29e/0x300 [ 2336.599663][ T8387] ? _raw_spin_unlock+0x5/0x20 [ 2336.604393][ T8387] ? __mark_inode_dirty+0xa89/0xbd0 [ 2336.609567][ T8387] __sync_dirty_buffer+0x1d2/0x2d0 [ 2336.614650][ T8387] ext4_commit_super+0x857/0xa30 [ 2336.619555][ T8387] ext4_setup_super+0x544/0x950 [ 2336.624375][ T8387] ext4_fill_super+0xaa4e/0xe890 [ 2336.629284][ T8387] ? ext4_mount+0x40/0x40 [ 2336.633579][ T8387] ? idr_replace+0x1aa/0x220 [ 2336.638143][ T8387] ? snprintf+0xc0/0x110 [ 2336.642370][ T8387] ? up_read+0x10/0x10 [ 2336.646412][ T8387] ? vscnprintf+0x80/0x80 [ 2336.650727][ T8387] mount_bdev+0x22d/0x340 [ 2336.655032][ T8387] ? ext4_mount+0x40/0x40 [ 2336.659342][ T8387] legacy_get_tree+0xde/0x170 [ 2336.663988][ T8387] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2336.669328][ T8387] vfs_get_tree+0x85/0x260 [ 2336.673721][ T8387] do_mount+0x1883/0x2630 [ 2336.678026][ T8387] ? _raw_spin_unlock+0x5/0x20 [ 2336.682860][ T8387] ? ___slab_alloc+0x297/0x450 [ 2336.687592][ T8387] ? copy_mount_string+0x30/0x30 [ 2336.692500][ T8387] ? copy_mount_options+0x59/0x320 [ 2336.697582][ T8387] ? copy_mount_options+0x293/0x320 [ 2336.702747][ T8387] ksys_mount+0xc2/0xf0 [ 2336.706872][ T8387] __x64_sys_mount+0xb1/0xc0 [ 2336.711448][ T8387] do_syscall_64+0xcb/0x150 [ 2336.715920][ T8387] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2336.721779][ T8387] RIP: 0033:0x4608aa [ 2336.725641][ T8387] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2336.745213][ T8387] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 18:55:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200fdfdffff0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2336.753605][ T8387] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2336.761566][ T8387] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2336.769517][ T8387] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2336.777456][ T8387] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2336.785431][ T8387] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2336.802623][ T8387] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 18:55:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x1f00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:56 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040009400000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02007fffffff0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x5}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x2080884, &(0x7f0000000300)=ANY=[]) pipe(&(0x7f0000000940)={0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x3, 0x2, 0x301, 0x0, 0x0, {0x1, 0x0, 0x9}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000010}, 0x4000095) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 18:55:56 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xe00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:56 executing program 4 (fault-call:0 fault-nth:85): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e02008cffffff0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2336.880417][ T8402] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2336.895218][ T8386] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 2336.906596][ T8402] EXT4-fs (loop3): get root inode failed [ 2336.912925][ T8402] EXT4-fs (loop3): mount failed 18:55:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020097ffffff0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200f6ffffff0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200fdffffff0300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000800000000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000000100000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:56 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x2000000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:56 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000000000200000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:56 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040009500000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2337.103143][ T8416] FAULT_INJECTION: forcing a failure. [ 2337.103143][ T8416] name failslab, interval 1, probability 0, space 0, times 0 [ 2337.116138][ T8416] CPU: 1 PID: 8416 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2337.126196][ T8416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2337.136233][ T8416] Call Trace: [ 2337.139508][ T8416] dump_stack+0x1b0/0x21e [ 2337.143811][ T8416] ? devkmsg_release+0x11c/0x11c [ 2337.148719][ T8416] ? show_regs_print_info+0x12/0x12 [ 2337.153887][ T8416] ? unwind_get_return_address_ptr+0x130/0x130 [ 2337.160029][ T8416] should_fail+0x6fb/0x860 [ 2337.164416][ T8416] ? setup_fault_attr+0x2b0/0x2b0 [ 2337.169409][ T8416] ? __kernel_text_address+0x93/0x110 [ 2337.174750][ T8416] ? unwind_get_return_address+0x48/0x90 [ 2337.180351][ T8416] ? arch_stack_walk+0x98/0xe0 [ 2337.185091][ T8416] ? mempool_alloc_slab+0x16/0x30 [ 2337.190098][ T8416] ? mempool_free+0x380/0x380 [ 2337.194742][ T8416] should_failslab+0x5/0x20 [ 2337.199216][ T8416] kmem_cache_alloc+0x36/0x250 [ 2337.203998][ T8416] ? mempool_free+0x380/0x380 [ 2337.208660][ T8416] mempool_alloc_slab+0x16/0x30 [ 2337.213481][ T8416] mempool_alloc+0x100/0x650 [ 2337.218040][ T8416] ? __ext4_ext_check+0x959/0x1120 [ 2337.223122][ T8416] ? mempool_resize+0x910/0x910 [ 2337.227987][ T8416] ? chksum_update+0x41/0x90 [ 2337.232550][ T8416] ? crypto_shash_update+0x1e3/0x2b0 [ 2337.237804][ T8416] ? __kasan_kmalloc+0x117/0x1b0 [ 2337.242713][ T8416] ? kmem_cache_alloc+0x1d5/0x250 [ 2337.247727][ T8416] ? _raw_spin_lock_irqsave+0xda/0x1c0 [ 2337.253166][ T8416] bio_alloc_bioset+0x1fc/0x660 [ 2337.258089][ T8416] ? bio_chain_endio+0xf0/0xf0 [ 2337.262822][ T8416] ? __xa_set_mark+0x3fa/0x4c0 [ 2337.267569][ T8416] submit_bh_wbc+0x1ba/0x790 [ 2337.272146][ T8416] ? __wake_up_bit+0x170/0x170 [ 2337.276882][ T8416] ? inode_io_list_move_locked+0x29e/0x300 [ 2337.282657][ T8416] ? _raw_spin_unlock+0x5/0x20 [ 2337.287393][ T8416] ? __mark_inode_dirty+0xa89/0xbd0 [ 2337.292601][ T8416] __sync_dirty_buffer+0x1d2/0x2d0 [ 2337.297686][ T8416] ext4_commit_super+0x857/0xa30 [ 2337.302639][ T8416] ext4_setup_super+0x544/0x950 [ 2337.307476][ T8416] ext4_fill_super+0xaa4e/0xe890 [ 2337.312386][ T8416] ? ext4_mount+0x40/0x40 [ 2337.316688][ T8416] ? idr_replace+0x1aa/0x220 [ 2337.321249][ T8416] ? snprintf+0xc0/0x110 [ 2337.325494][ T8416] ? up_read+0x10/0x10 [ 2337.329536][ T8416] ? vscnprintf+0x80/0x80 [ 2337.333843][ T8416] mount_bdev+0x22d/0x340 [ 2337.338197][ T8416] ? ext4_mount+0x40/0x40 [ 2337.342521][ T8416] legacy_get_tree+0xde/0x170 [ 2337.347166][ T8416] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2337.352504][ T8416] vfs_get_tree+0x85/0x260 [ 2337.356915][ T8416] do_mount+0x1883/0x2630 [ 2337.361227][ T8416] ? setup_fault_attr+0x2b0/0x2b0 [ 2337.366220][ T8416] ? up_write+0xa1/0x190 [ 2337.370432][ T8416] ? setup_fault_attr+0x2b0/0x2b0 [ 2337.375441][ T8416] ? copy_mount_string+0x30/0x30 [ 2337.380351][ T8416] ? retain_dentry+0x275/0x360 [ 2337.385090][ T8416] ? copy_mount_options+0x59/0x320 [ 2337.390183][ T8416] ? copy_mount_options+0x293/0x320 [ 2337.395356][ T8416] ksys_mount+0xc2/0xf0 [ 2337.399484][ T8416] __x64_sys_mount+0xb1/0xc0 [ 2337.404044][ T8416] do_syscall_64+0xcb/0x150 [ 2337.408519][ T8416] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2337.414395][ T8416] RIP: 0033:0x4608aa [ 2337.418281][ T8416] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2337.437857][ T8416] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2337.446237][ T8416] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2337.454181][ T8416] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2337.462120][ T8416] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2337.470072][ T8416] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2337.478012][ T8416] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2337.495489][ T8416] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 2337.517647][ T8437] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2337.537582][ T8437] EXT4-fs (loop3): get root inode failed [ 2337.547070][ T8437] EXT4-fs (loop3): mount failed [ 2337.656009][ T8437] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2337.671731][ T8437] EXT4-fs (loop3): get root inode failed [ 2337.681317][ T8437] EXT4-fs (loop3): mount failed 18:55:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) 18:55:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:57 executing program 4 (fault-call:0 fault-nth:86): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:57 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040009800000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x2010000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xf00, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000300000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000500000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:57 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000004026cf00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2337.874379][ T8467] FAULT_INJECTION: forcing a failure. [ 2337.874379][ T8467] name failslab, interval 1, probability 0, space 0, times 0 [ 2337.902700][ T8467] CPU: 1 PID: 8467 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2337.912788][ T8467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2337.922828][ T8467] Call Trace: [ 2337.926115][ T8467] dump_stack+0x1b0/0x21e [ 2337.927875][ T8476] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2337.930432][ T8467] ? devkmsg_release+0x11c/0x11c [ 2337.930444][ T8467] ? show_regs_print_info+0x12/0x12 [ 2337.930460][ T8467] ? __ext4_iget+0x3090/0x48a0 [ 2337.943123][ T8476] EXT4-fs (loop3): get root inode failed [ 2337.946799][ T8467] should_fail+0x6fb/0x860 [ 2337.946815][ T8467] ? setup_fault_attr+0x2b0/0x2b0 [ 2337.952023][ T8476] EXT4-fs (loop3): mount failed [ 2337.956721][ T8467] ? __d_alloc+0x2a/0x6b0 [ 2337.956728][ T8467] should_failslab+0x5/0x20 [ 2337.956738][ T8467] kmem_cache_alloc+0x36/0x250 [ 2337.956746][ T8467] ? ext4_fill_super+0xa90f/0xe890 [ 2337.956758][ T8467] __d_alloc+0x2a/0x6b0 [ 2337.999281][ T8467] d_make_root+0x46/0xd0 [ 2338.003511][ T8467] ext4_fill_super+0xa9e4/0xe890 [ 2338.008446][ T8467] ? ext4_mount+0x40/0x40 [ 2338.012752][ T8467] ? idr_replace+0x1aa/0x220 [ 2338.017325][ T8467] ? snprintf+0xc0/0x110 [ 2338.021545][ T8467] ? up_read+0x10/0x10 [ 2338.025597][ T8467] ? vscnprintf+0x80/0x80 [ 2338.029932][ T8467] mount_bdev+0x22d/0x340 [ 2338.034242][ T8467] ? ext4_mount+0x40/0x40 [ 2338.038568][ T8467] legacy_get_tree+0xde/0x170 [ 2338.043240][ T8467] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2338.048587][ T8467] vfs_get_tree+0x85/0x260 [ 2338.052999][ T8467] do_mount+0x1883/0x2630 [ 2338.057318][ T8467] ? _raw_spin_unlock+0x5/0x20 [ 2338.062061][ T8467] ? ___slab_alloc+0x297/0x450 [ 2338.066802][ T8467] ? copy_mount_string+0x30/0x30 [ 2338.071713][ T8467] ? copy_mount_options+0x59/0x320 [ 2338.076800][ T8467] ? copy_mount_options+0x293/0x320 [ 2338.081973][ T8467] ksys_mount+0xc2/0xf0 [ 2338.086127][ T8467] __x64_sys_mount+0xb1/0xc0 [ 2338.090695][ T8467] do_syscall_64+0xcb/0x150 [ 2338.095179][ T8467] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2338.101047][ T8467] RIP: 0033:0x4608aa [ 2338.104974][ T8467] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 18:55:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x2200000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2338.124569][ T8467] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2338.132963][ T8467] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2338.140918][ T8467] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2338.148872][ T8467] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2338.156823][ T8467] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2338.164770][ T8467] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:55:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000600000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2338.178086][ T8479] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2338.186623][ T8467] EXT4-fs (loop4): get root dentry failed [ 2338.193172][ T8467] EXT4-fs (loop4): mount failed 18:55:57 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@private2}}, &(0x7f0000000140)=0xe8) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r2) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x80000101005, 0x0) r4 = dup2(r3, r3) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000000)=""/246) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = fcntl$dupfd(r3, 0x0, r5) ioctl$PPPIOCSMAXCID(r6, 0x40047451, &(0x7f0000000300)) pwritev(r3, &(0x7f0000000100)=[{&(0x7f0000000180)='\x00!', 0x2}, {&(0x7f0000000240)="15", 0x1}], 0x2, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000440)={{}, {}, [{0x2, 0x3, 0xee00}, {0x2, 0x1}, {0x2, 0x7}, {0x2, 0x1, r0}, {0x2, 0x3, 0xee00}, {0x2, 0x5, 0xffffffffffffffff}, {0x2, 0x7, 0xee01}, {0x2, 0x6, 0xee01}, {0x2, 0x5, 0xee00}, {0x2, 0x0, r2}], {0x4, 0x2}, [{0x8, 0x1, 0xee01}, {0x8, 0x7, r7}], {0x10, 0x4}, {0x20, 0x4}}, 0x84, 0xdb6e22fd88bf3682) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 18:55:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000700000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:57 executing program 4 (fault-call:0 fault-nth:87): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:57 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040c0ed00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2338.300451][ T8476] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2338.318043][ T8476] EXT4-fs (loop3): get root inode failed [ 2338.324296][ T8476] EXT4-fs (loop3): mount failed 18:55:57 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x1001, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:57 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000900000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:58 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000a00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:58 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000b00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:58 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000c00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x2600000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:58 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000d00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2338.534750][ T8524] FAULT_INJECTION: forcing a failure. [ 2338.534750][ T8524] name failslab, interval 1, probability 0, space 0, times 0 [ 2338.539316][ T8525] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2338.547493][ T8524] CPU: 0 PID: 8524 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2338.566306][ T8524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2338.576340][ T8524] Call Trace: [ 2338.579603][ T8524] dump_stack+0x1b0/0x21e [ 2338.583916][ T8524] ? devkmsg_release+0x11c/0x11c [ 2338.588867][ T8524] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2338.594916][ T8524] ? show_regs_print_info+0x12/0x12 [ 2338.600082][ T8524] ? generic_make_request+0xd43/0xde0 [ 2338.605424][ T8524] ? chksum_update+0x41/0x90 [ 2338.609987][ T8524] should_fail+0x6fb/0x860 [ 2338.614374][ T8524] ? setup_fault_attr+0x2b0/0x2b0 [ 2338.619368][ T8524] ? __bio_add_page+0x274/0x430 [ 2338.624185][ T8524] ? should_fail+0x182/0x860 [ 2338.628755][ T8524] ? add_system_zone+0x138/0x510 [ 2338.633673][ T8524] should_failslab+0x5/0x20 [ 2338.638166][ T8524] kmem_cache_alloc+0x36/0x250 [ 2338.642898][ T8524] add_system_zone+0x138/0x510 [ 2338.647627][ T8524] ? ext4_bg_num_gdb+0x12c/0x200 [ 2338.652546][ T8524] ext4_setup_system_zone+0x2d9/0xef0 [ 2338.657885][ T8524] ? ext4_exit_system_zone+0x20/0x20 [ 2338.663142][ T8524] ? __cleancache_init_fs+0x66/0xb0 [ 2338.668308][ T8524] ? ext4_setup_super+0x597/0x950 [ 2338.673301][ T8524] ext4_fill_super+0xbb33/0xe890 [ 2338.678209][ T8524] ? ext4_mount+0x40/0x40 [ 2338.682505][ T8524] ? idr_replace+0x1aa/0x220 [ 2338.687064][ T8524] ? snprintf+0xc0/0x110 [ 2338.691289][ T8524] ? up_read+0x10/0x10 [ 2338.695325][ T8524] ? vscnprintf+0x80/0x80 [ 2338.699632][ T8524] mount_bdev+0x22d/0x340 [ 2338.703940][ T8524] ? ext4_mount+0x40/0x40 [ 2338.708252][ T8524] legacy_get_tree+0xde/0x170 [ 2338.712905][ T8524] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2338.718248][ T8524] vfs_get_tree+0x85/0x260 [ 2338.722634][ T8524] do_mount+0x1883/0x2630 [ 2338.726949][ T8524] ? _raw_spin_unlock+0x5/0x20 [ 2338.731720][ T8524] ? ___slab_alloc+0x297/0x450 [ 2338.736492][ T8524] ? copy_mount_string+0x30/0x30 [ 2338.741418][ T8524] ? copy_mount_options+0x59/0x320 [ 2338.746498][ T8524] ? copy_mount_options+0x293/0x320 [ 2338.751664][ T8524] ksys_mount+0xc2/0xf0 [ 2338.755788][ T8524] __x64_sys_mount+0xb1/0xc0 [ 2338.760346][ T8524] do_syscall_64+0xcb/0x150 [ 2338.764868][ T8524] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2338.770736][ T8524] RIP: 0033:0x4608aa [ 2338.774598][ T8524] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2338.794169][ T8524] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2338.802563][ T8524] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2338.810518][ T8524] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2338.818475][ T8524] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2338.826441][ T8524] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2338.834395][ T8524] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2338.843846][ T8524] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 18:55:58 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000000100)="200000004000f434813f7cc4bfb98af0ad8e0ca9e00175812cb2f0cb5664437fca380000030000002d0000000f00000000000000021c0000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xbe, 0x400}, {&(0x7f0000000080)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0xc1}, {&(0x7f00000002c0)="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", 0x116, 0x540}, {&(0x7f0000000040)="0000000000000000000000000000000000000000000000fd0e000000787371fe", 0x20, 0x81}, {&(0x7f00000001c0)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0xffd}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 18:55:58 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000e00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:58 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000004003fa00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:58 executing program 4 (fault-call:0 fault-nth:88): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:58 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2338.927078][ T8547] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2338.939456][ T8547] EXT4-fs (loop3): get root inode failed [ 2338.945451][ T8547] EXT4-fs (loop3): mount failed [ 2339.076727][ T8547] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2339.093184][ T8547] EXT4-fs (loop3): get root inode failed [ 2339.100448][ T8547] EXT4-fs (loop3): mount failed [ 2339.110284][ T8561] FAULT_INJECTION: forcing a failure. [ 2339.110284][ T8561] name failslab, interval 1, probability 0, space 0, times 0 [ 2339.122928][ T8561] CPU: 0 PID: 8561 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2339.132957][ T8561] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2339.142981][ T8561] Call Trace: [ 2339.146261][ T8561] dump_stack+0x1b0/0x21e [ 2339.150564][ T8561] ? devkmsg_release+0x11c/0x11c [ 2339.155484][ T8561] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2339.161527][ T8561] ? show_regs_print_info+0x12/0x12 [ 2339.166709][ T8561] ? generic_make_request+0xd43/0xde0 [ 2339.172052][ T8561] ? chksum_update+0x41/0x90 [ 2339.176621][ T8561] should_fail+0x6fb/0x860 [ 2339.181009][ T8561] ? setup_fault_attr+0x2b0/0x2b0 [ 2339.186001][ T8561] ? __bio_add_page+0x274/0x430 [ 2339.190819][ T8561] ? should_fail+0x182/0x860 [ 2339.195374][ T8561] ? add_system_zone+0x138/0x510 [ 2339.200277][ T8561] should_failslab+0x5/0x20 [ 2339.204749][ T8561] kmem_cache_alloc+0x36/0x250 [ 2339.209483][ T8561] add_system_zone+0x138/0x510 [ 2339.214233][ T8561] ? ext4_get_group_desc+0x253/0x2a0 [ 2339.219499][ T8561] ext4_setup_system_zone+0x30c/0xef0 [ 2339.224844][ T8561] ? ext4_exit_system_zone+0x20/0x20 [ 2339.230115][ T8561] ? __cleancache_init_fs+0x66/0xb0 [ 2339.235322][ T8561] ? ext4_setup_super+0x597/0x950 [ 2339.240329][ T8561] ext4_fill_super+0xbb33/0xe890 [ 2339.245238][ T8561] ? ext4_mount+0x40/0x40 [ 2339.249535][ T8561] ? idr_replace+0x1aa/0x220 [ 2339.254094][ T8561] ? snprintf+0xc0/0x110 [ 2339.258306][ T8561] ? up_read+0x10/0x10 [ 2339.262351][ T8561] ? vscnprintf+0x80/0x80 [ 2339.266670][ T8561] mount_bdev+0x22d/0x340 [ 2339.270967][ T8561] ? ext4_mount+0x40/0x40 [ 2339.275282][ T8561] legacy_get_tree+0xde/0x170 [ 2339.279933][ T8561] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2339.285317][ T8561] vfs_get_tree+0x85/0x260 [ 2339.289709][ T8561] do_mount+0x1883/0x2630 [ 2339.294042][ T8561] ? setup_fault_attr+0x2b0/0x2b0 [ 2339.299055][ T8561] ? up_write+0xa1/0x190 [ 2339.303273][ T8561] ? setup_fault_attr+0x2b0/0x2b0 [ 2339.308283][ T8561] ? copy_mount_string+0x30/0x30 [ 2339.313189][ T8561] ? retain_dentry+0x275/0x360 [ 2339.317928][ T8561] ? copy_mount_options+0x59/0x320 [ 2339.323021][ T8561] ? copy_mount_options+0x293/0x320 [ 2339.328191][ T8561] ksys_mount+0xc2/0xf0 [ 2339.332327][ T8561] __x64_sys_mount+0xb1/0xc0 [ 2339.336913][ T8561] do_syscall_64+0xcb/0x150 [ 2339.341391][ T8561] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2339.347253][ T8561] RIP: 0033:0x4608aa [ 2339.351136][ T8561] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2339.370716][ T8561] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2339.379102][ T8561] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2339.387067][ T8561] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2339.395062][ T8561] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2339.403010][ T8561] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2339.410985][ T8561] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2339.420384][ T8561] EXT4-fs (loop4): failed to initialize system zone (-12) 18:55:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x3005000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:59 executing program 4 (fault-call:0 fault-nth:89): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001100000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000004026fa00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x1020, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2339.428314][ T8561] EXT4-fs (loop4): mount failed [ 2339.448452][ T8565] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 18:55:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1001}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200002200000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000004003fb00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x3f00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2339.562240][ T8565] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 2339.598323][ T8573] FAULT_INJECTION: forcing a failure. [ 2339.598323][ T8573] name failslab, interval 1, probability 0, space 0, times 0 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200002500000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2339.619945][ T8573] CPU: 0 PID: 8573 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2339.630034][ T8573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2339.640077][ T8573] Call Trace: [ 2339.643357][ T8573] dump_stack+0x1b0/0x21e [ 2339.647671][ T8573] ? devkmsg_release+0x11c/0x11c [ 2339.652607][ T8573] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2339.658679][ T8573] ? show_regs_print_info+0x12/0x12 [ 2339.663857][ T8573] ? generic_make_request+0xd43/0xde0 [ 2339.669224][ T8573] ? chksum_update+0x41/0x90 [ 2339.673800][ T8573] should_fail+0x6fb/0x860 [ 2339.678214][ T8573] ? setup_fault_attr+0x2b0/0x2b0 [ 2339.683224][ T8573] ? slab_free_freelist_hook+0xd0/0x150 [ 2339.688749][ T8573] ? add_system_zone+0x31b/0x510 [ 2339.693677][ T8573] ? kmem_cache_free+0xac/0x5c0 [ 2339.698508][ T8573] ? add_system_zone+0x138/0x510 [ 2339.701039][ T8587] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2339.703420][ T8573] should_failslab+0x5/0x20 [ 2339.703431][ T8573] kmem_cache_alloc+0x36/0x250 [ 2339.703442][ T8573] add_system_zone+0x138/0x510 [ 2339.703456][ T8573] ext4_setup_system_zone+0x33c/0xef0 [ 2339.715189][ T8587] EXT4-fs (loop3): get root inode failed [ 2339.719368][ T8573] ? ext4_exit_system_zone+0x20/0x20 [ 2339.719376][ T8573] ? __cleancache_init_fs+0x66/0xb0 [ 2339.719389][ T8573] ? ext4_setup_super+0x597/0x950 [ 2339.729624][ T8587] EXT4-fs (loop3): mount failed [ 2339.734225][ T8573] ext4_fill_super+0xbb33/0xe890 [ 2339.734240][ T8573] ? ext4_mount+0x40/0x40 [ 2339.734248][ T8573] ? idr_replace+0x1aa/0x220 [ 2339.734259][ T8573] ? snprintf+0xc0/0x110 [ 2339.734266][ T8573] ? up_read+0x10/0x10 [ 2339.734274][ T8573] ? vscnprintf+0x80/0x80 [ 2339.734285][ T8573] mount_bdev+0x22d/0x340 [ 2339.734297][ T8573] ? ext4_mount+0x40/0x40 [ 2339.795095][ T8573] legacy_get_tree+0xde/0x170 [ 2339.799756][ T8573] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2339.805186][ T8573] vfs_get_tree+0x85/0x260 [ 2339.809572][ T8573] do_mount+0x1883/0x2630 [ 2339.813884][ T8573] ? setup_fault_attr+0x2b0/0x2b0 [ 2339.818887][ T8573] ? up_write+0xa1/0x190 [ 2339.823104][ T8573] ? ___slab_alloc+0x9b/0x450 [ 2339.827748][ T8573] ? copy_mount_string+0x30/0x30 [ 2339.832652][ T8573] ? retain_dentry+0x275/0x360 [ 2339.837381][ T8573] ? copy_mount_options+0x59/0x320 [ 2339.842467][ T8573] ? copy_mount_options+0x293/0x320 [ 2339.847632][ T8573] ksys_mount+0xc2/0xf0 [ 2339.851755][ T8573] __x64_sys_mount+0xb1/0xc0 [ 2339.856312][ T8573] do_syscall_64+0xcb/0x150 [ 2339.860798][ T8573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2339.866656][ T8573] RIP: 0033:0x4608aa [ 2339.870517][ T8573] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2339.890090][ T8573] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2339.898486][ T8573] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2339.906428][ T8573] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2339.914368][ T8573] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2339.922308][ T8573] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2339.930263][ T8573] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2339.939527][ T8573] EXT4-fs (loop4): failed to initialize system zone (-12) [ 2339.946982][ T8573] EXT4-fs (loop4): mount failed [ 2340.145900][ T8587] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2340.157854][ T8587] EXT4-fs (loop3): get root inode failed [ 2340.163596][ T8587] EXT4-fs (loop3): mount failed 18:55:59 executing program 4 (fault-call:0 fault-nth:90): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:59 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x1100, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:55:59 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000004003fc00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x4000000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:55:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') clock_gettime(0x0, &(0x7f0000002d40)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000002c80)=[{{&(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000340)=""/130, 0x82}, {&(0x7f0000000400)=""/79, 0x4f}, {&(0x7f0000000480)=""/77, 0x4d}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/226, 0xe2}, {&(0x7f0000001600)=""/90, 0x5a}, {&(0x7f0000001680)=""/90, 0x5a}], 0x7, &(0x7f0000001780)=""/7, 0x7}, 0x1}, {{&(0x7f00000017c0)=@nl=@unspec, 0x80, &(0x7f0000001880)=[{&(0x7f0000001840)=""/39, 0x27}], 0x1}, 0xe41}, {{&(0x7f00000018c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000001940)=""/192, 0xc0}, {&(0x7f0000001a00)=""/115, 0x73}, {&(0x7f0000001a80)=""/19, 0x13}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/108, 0x6c}], 0x5, &(0x7f0000002bc0)=""/150, 0x96}}], 0x3, 0x10002, &(0x7f0000002d80)={r0, r1+10000000}) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000100)="3a9d428dbc194dd06737e2f6cfb3c46a15536e0b0bbfeb9ba81c06c950ba65149b3450b2befbd3abc3b8423c7176f1d2018893b0a13f5c3aa499d71e9b03a069c6fa53f1eecbcf8210e67745b7844afc95eaf53598a03bb573dc7482f4f8c5dcc5e5b578eefce5a42344257cf785ea3bbfa7280b2fd3366dc96969198dcf122b7e7af2a1a8241bf66ea864d8cf95c238a3d544a1566e105deffd8e364ab8885147c1ea869874d5c5ac8afa8fffba46cf3fc99c26655cfcc440097b662485fd9370edea") 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004c00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200006000000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200006800000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200006c00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200007400000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:55:59 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000004003fd00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2340.295648][ T8618] FAULT_INJECTION: forcing a failure. [ 2340.295648][ T8618] name failslab, interval 1, probability 0, space 0, times 0 [ 2340.309710][ T8618] CPU: 1 PID: 8618 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2340.319762][ T8618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2340.329799][ T8618] Call Trace: [ 2340.333096][ T8618] dump_stack+0x1b0/0x21e [ 2340.337426][ T8618] ? devkmsg_release+0x11c/0x11c [ 2340.342354][ T8618] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2340.348433][ T8618] ? show_regs_print_info+0x12/0x12 [ 2340.353619][ T8618] ? prepare_to_wait+0x20b/0x270 [ 2340.358557][ T8618] ? chksum_update+0x41/0x90 [ 2340.363150][ T8618] should_fail+0x6fb/0x860 [ 2340.367562][ T8618] ? setup_fault_attr+0x2b0/0x2b0 [ 2340.372579][ T8618] ? __wait_on_bit+0x177/0x190 [ 2340.377334][ T8618] ? should_fail+0x182/0x860 [ 2340.381918][ T8618] ? add_system_zone+0x138/0x510 [ 2340.386847][ T8618] should_failslab+0x5/0x20 [ 2340.391342][ T8618] kmem_cache_alloc+0x36/0x250 [ 2340.396106][ T8618] add_system_zone+0x138/0x510 [ 2340.400863][ T8618] ? ext4_get_group_desc+0x253/0x2a0 [ 2340.406143][ T8618] ext4_setup_system_zone+0x30c/0xef0 [ 2340.411501][ T8618] ? ext4_exit_system_zone+0x20/0x20 [ 2340.416767][ T8618] ? __cleancache_init_fs+0x66/0xb0 [ 2340.421955][ T8618] ? ext4_setup_super+0x597/0x950 [ 2340.426970][ T8618] ext4_fill_super+0xbb33/0xe890 [ 2340.431904][ T8618] ? ext4_mount+0x40/0x40 [ 2340.436230][ T8618] ? idr_replace+0x1aa/0x220 [ 2340.440812][ T8618] ? snprintf+0xc0/0x110 [ 2340.445048][ T8618] ? up_read+0x10/0x10 [ 2340.449117][ T8618] ? vscnprintf+0x80/0x80 [ 2340.453443][ T8618] mount_bdev+0x22d/0x340 [ 2340.457763][ T8618] ? ext4_mount+0x40/0x40 [ 2340.462087][ T8618] legacy_get_tree+0xde/0x170 [ 2340.466780][ T8618] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2340.472146][ T8618] vfs_get_tree+0x85/0x260 [ 2340.476554][ T8618] do_mount+0x1883/0x2630 [ 2340.480869][ T8618] ? setup_fault_attr+0x2b0/0x2b0 [ 2340.485863][ T8618] ? up_write+0xa1/0x190 [ 2340.490086][ T8618] ? ___slab_alloc+0x9b/0x450 [ 2340.494760][ T8618] ? copy_mount_string+0x30/0x30 [ 2340.499667][ T8618] ? retain_dentry+0x275/0x360 [ 2340.504404][ T8618] ? copy_mount_options+0x59/0x320 [ 2340.509486][ T8618] ? copy_mount_options+0x293/0x320 [ 2340.514651][ T8618] ksys_mount+0xc2/0xf0 [ 2340.518777][ T8618] __x64_sys_mount+0xb1/0xc0 [ 2340.523338][ T8618] do_syscall_64+0xcb/0x150 [ 2340.527813][ T8618] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2340.533720][ T8618] RIP: 0033:0x4608aa [ 2340.537598][ T8618] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2340.557210][ T8618] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2340.565592][ T8618] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2340.573541][ T8618] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2340.581494][ T8618] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 18:56:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200007a00000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2340.589435][ T8618] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2340.597375][ T8618] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2340.606716][ T8618] EXT4-fs (loop4): failed to initialize system zone (-12) [ 2340.615724][ T8618] EXT4-fs (loop4): mount failed [ 2340.667565][ T8635] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2340.679510][ T8635] EXT4-fs (loop3): get root inode failed [ 2340.685987][ T8635] EXT4-fs (loop3): mount failed 18:56:00 executing program 4 (fault-call:0 fault-nth:91): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) [ 2340.790838][ T8635] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2340.806342][ T8637] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2340.812974][ T8635] EXT4-fs (loop3): get root inode failed [ 2340.825803][ T8664] FAULT_INJECTION: forcing a failure. [ 2340.825803][ T8664] name failslab, interval 1, probability 0, space 0, times 0 [ 2340.834151][ T8635] EXT4-fs (loop3): mount failed [ 2340.839181][ T8664] CPU: 0 PID: 8664 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2340.853310][ T8664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2340.863358][ T8664] Call Trace: [ 2340.866655][ T8664] dump_stack+0x1b0/0x21e [ 2340.870977][ T8664] ? devkmsg_release+0x11c/0x11c [ 2340.875919][ T8664] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2340.881988][ T8664] ? show_regs_print_info+0x12/0x12 [ 2340.887171][ T8664] ? prepare_to_wait+0x20b/0x270 [ 2340.892101][ T8664] ? chksum_update+0x41/0x90 [ 2340.896678][ T8664] should_fail+0x6fb/0x860 [ 2340.901075][ T8664] ? setup_fault_attr+0x2b0/0x2b0 [ 2340.906080][ T8664] ? slab_free_freelist_hook+0xd0/0x150 [ 2340.911604][ T8664] ? add_system_zone+0x31b/0x510 [ 2340.916538][ T8664] ? kmem_cache_free+0xac/0x5c0 [ 2340.921367][ T8664] ? add_system_zone+0x138/0x510 [ 2340.926301][ T8664] should_failslab+0x5/0x20 [ 2340.930787][ T8664] kmem_cache_alloc+0x36/0x250 [ 2340.935534][ T8664] add_system_zone+0x138/0x510 [ 2340.940281][ T8664] ext4_setup_system_zone+0x393/0xef0 [ 2340.945636][ T8664] ? ext4_exit_system_zone+0x20/0x20 [ 2340.950915][ T8664] ? __cleancache_init_fs+0x66/0xb0 [ 2340.956105][ T8664] ? ext4_setup_super+0x597/0x950 [ 2340.961108][ T8664] ext4_fill_super+0xbb33/0xe890 [ 2340.966031][ T8664] ? ext4_mount+0x40/0x40 [ 2340.970340][ T8664] ? idr_replace+0x1aa/0x220 [ 2340.974938][ T8664] ? snprintf+0xc0/0x110 [ 2340.979162][ T8664] ? up_read+0x10/0x10 [ 2340.983214][ T8664] ? vscnprintf+0x80/0x80 [ 2340.987526][ T8664] mount_bdev+0x22d/0x340 [ 2340.991852][ T8664] ? ext4_mount+0x40/0x40 [ 2340.996178][ T8664] legacy_get_tree+0xde/0x170 [ 2341.000832][ T8664] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2341.006202][ T8664] vfs_get_tree+0x85/0x260 [ 2341.010602][ T8664] do_mount+0x1883/0x2630 [ 2341.014930][ T8664] ? setup_fault_attr+0x2b0/0x2b0 [ 2341.019949][ T8664] ? up_write+0xa1/0x190 [ 2341.024173][ T8664] ? ___slab_alloc+0x9b/0x450 [ 2341.028850][ T8664] ? copy_mount_string+0x30/0x30 [ 2341.033767][ T8664] ? retain_dentry+0x275/0x360 [ 2341.038509][ T8664] ? copy_mount_options+0x59/0x320 [ 2341.043608][ T8664] ? copy_mount_options+0x293/0x320 [ 2341.048792][ T8664] ksys_mount+0xc2/0xf0 [ 2341.052932][ T8664] __x64_sys_mount+0xb1/0xc0 [ 2341.057502][ T8664] do_syscall_64+0xcb/0x150 [ 2341.061985][ T8664] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2341.067854][ T8664] RIP: 0033:0x4608aa [ 2341.071726][ T8664] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2341.091323][ T8664] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2341.099822][ T8664] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2341.107770][ T8664] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2341.115739][ T8664] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2341.123686][ T8664] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2341.131642][ T8664] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2341.165369][ T8664] EXT4-fs (loop4): failed to initialize system zone (-12) [ 2341.172689][ T8664] EXT4-fs (loop4): mount failed 18:56:00 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x1200, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200006101000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x4000080000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:00 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000004003fe00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:00 executing program 4 (fault-call:0 fault-nth:92): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200006d01000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:00 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r0, &(0x7f0000000980)={0x8, {"00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f5ffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000001d00", 0x1000}}, 0x1006) sendfile(r0, r0, &(0x7f0000000100), 0x8080ffffff7e) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000440)='devlink\x00') sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)={0x3c, r1, 0x800, 0x70bd2a, 0x25dfdbfe, {}, [{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x4698}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000c891}, 0xc000) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r1, 0x400, 0x70bd25, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x801}, 0xbe29fd13a4e780d9) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) 18:56:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200007901000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000fe01000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200008602000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:00 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200009202000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:00 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c00000009000000200000000100000000000000004003ff00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) [ 2341.341500][ T8689] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2341.385694][ T8692] FAULT_INJECTION: forcing a failure. [ 2341.385694][ T8692] name failslab, interval 1, probability 0, space 0, times 0 [ 2341.400189][ T8692] CPU: 1 PID: 8692 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2341.410256][ T8692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2341.420310][ T8692] Call Trace: [ 2341.423595][ T8692] dump_stack+0x1b0/0x21e [ 2341.427913][ T8692] ? devkmsg_release+0x11c/0x11c [ 2341.432863][ T8692] ? show_regs_print_info+0x12/0x12 [ 2341.438046][ T8692] should_fail+0x6fb/0x860 [ 2341.442447][ T8692] ? setup_fault_attr+0x2b0/0x2b0 [ 2341.447454][ T8692] ? ___slab_alloc+0x9b/0x450 [ 2341.452106][ T8692] ? ext4_setup_system_zone+0x602/0xef0 [ 2341.457631][ T8692] ? ext4_mb_init+0x88/0x1360 [ 2341.462299][ T8692] ? ext4_mb_init+0xfd/0x1360 [ 2341.466956][ T8692] should_failslab+0x5/0x20 [ 2341.471439][ T8692] __kmalloc+0x5f/0x2c0 [ 2341.475573][ T8692] ? ext4_mb_init+0x88/0x1360 [ 2341.480227][ T8692] ext4_mb_init+0xfd/0x1360 [ 2341.484707][ T8692] ? __cleancache_init_fs+0x66/0xb0 [ 2341.489883][ T8692] ext4_fill_super+0xbc36/0xe890 [ 2341.494804][ T8692] ? ext4_mount+0x40/0x40 [ 2341.499109][ T8692] ? idr_replace+0x1aa/0x220 [ 2341.503679][ T8692] ? snprintf+0xc0/0x110 [ 2341.507897][ T8692] ? up_read+0x10/0x10 [ 2341.512027][ T8692] ? vscnprintf+0x80/0x80 [ 2341.516334][ T8692] mount_bdev+0x22d/0x340 [ 2341.520644][ T8692] ? ext4_mount+0x40/0x40 [ 2341.524952][ T8692] legacy_get_tree+0xde/0x170 [ 2341.529613][ T8692] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2341.534966][ T8692] vfs_get_tree+0x85/0x260 [ 2341.539362][ T8692] do_mount+0x1883/0x2630 [ 2341.543759][ T8692] ? setup_fault_attr+0x2b0/0x2b0 [ 2341.548759][ T8692] ? up_write+0xa1/0x190 [ 2341.552984][ T8692] ? setup_fault_attr+0x2b0/0x2b0 [ 2341.557985][ T8692] ? copy_mount_string+0x30/0x30 [ 2341.562900][ T8692] ? retain_dentry+0x275/0x360 [ 2341.567644][ T8692] ? copy_mount_options+0x59/0x320 [ 2341.572733][ T8692] ? copy_mount_options+0x293/0x320 [ 2341.577909][ T8692] ksys_mount+0xc2/0xf0 [ 2341.582045][ T8692] __x64_sys_mount+0xb1/0xc0 [ 2341.586631][ T8692] do_syscall_64+0xcb/0x150 [ 2341.591111][ T8692] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2341.596976][ T8692] RIP: 0033:0x4608aa [ 2341.600850][ T8692] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2341.620435][ T8692] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2341.628830][ T8692] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2341.636782][ T8692] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2341.644735][ T8692] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2341.652691][ T8692] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2341.660645][ T8692] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2341.675637][ T8692] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 2341.682726][ T8709] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2341.695086][ T8709] EXT4-fs (loop3): get root inode failed [ 2341.700826][ T8709] EXT4-fs (loop3): mount failed [ 2341.707002][ T8692] EXT4-fs (loop4): mount failed 18:56:01 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x1902, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:01 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200009e02000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x4800000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:01 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c0000000900000020000000010000000000000000400fff00000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:01 executing program 4 (fault-call:0 fault-nth:93): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:01 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000003000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2341.807153][ T8709] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2341.823495][ T8709] EXT4-fs (loop3): get root inode failed [ 2341.829197][ T8709] EXT4-fs (loop3): mount failed [ 2341.999119][ T8731] FAULT_INJECTION: forcing a failure. [ 2341.999119][ T8731] name failslab, interval 1, probability 0, space 0, times 0 [ 2342.019771][ T8731] CPU: 0 PID: 8731 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2342.029828][ T8731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2342.039861][ T8731] Call Trace: [ 2342.043153][ T8731] dump_stack+0x1b0/0x21e [ 2342.047464][ T8731] ? devkmsg_release+0x11c/0x11c [ 2342.052380][ T8731] ? show_regs_print_info+0x12/0x12 [ 2342.057565][ T8731] should_fail+0x6fb/0x860 [ 2342.061977][ T8731] ? setup_fault_attr+0x2b0/0x2b0 [ 2342.066983][ T8731] ? should_fail+0x182/0x860 [ 2342.071570][ T8731] ? kvmalloc_node+0xc2/0x120 [ 2342.076224][ T8731] should_failslab+0x5/0x20 [ 2342.080705][ T8731] __kmalloc+0x5f/0x2c0 [ 2342.084838][ T8731] ? pcpu_alloc+0xd17/0x11f0 [ 2342.089410][ T8731] kvmalloc_node+0xc2/0x120 [ 2342.093911][ T8731] ext4_mb_alloc_groupinfo+0xf9/0x2e0 [ 2342.099270][ T8731] ext4_mb_init+0xb66/0x1360 [ 2342.103844][ T8731] ext4_fill_super+0xbc36/0xe890 [ 2342.108772][ T8731] ? ext4_mount+0x40/0x40 [ 2342.113077][ T8731] ? idr_replace+0x1aa/0x220 [ 2342.117671][ T8731] ? snprintf+0xc0/0x110 [ 2342.121907][ T8731] ? up_read+0x10/0x10 [ 2342.125994][ T8731] ? vscnprintf+0x80/0x80 [ 2342.130307][ T8731] mount_bdev+0x22d/0x340 [ 2342.134617][ T8731] ? ext4_mount+0x40/0x40 [ 2342.138944][ T8731] legacy_get_tree+0xde/0x170 [ 2342.143599][ T8731] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2342.148976][ T8731] vfs_get_tree+0x85/0x260 [ 2342.153376][ T8731] do_mount+0x1883/0x2630 [ 2342.157683][ T8731] ? _raw_spin_unlock+0x5/0x20 [ 2342.162429][ T8731] ? ___slab_alloc+0x297/0x450 [ 2342.167169][ T8731] ? copy_mount_string+0x30/0x30 [ 2342.172086][ T8731] ? copy_mount_options+0x59/0x320 [ 2342.178137][ T8731] ? copy_mount_options+0x293/0x320 [ 2342.183315][ T8731] ksys_mount+0xc2/0xf0 [ 2342.187452][ T8731] __x64_sys_mount+0xb1/0xc0 [ 2342.192038][ T8731] do_syscall_64+0xcb/0x150 [ 2342.196551][ T8731] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2342.202451][ T8731] RIP: 0033:0x4608aa [ 2342.206325][ T8731] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2342.225918][ T8731] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2342.234419][ T8731] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2342.242371][ T8731] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2342.250326][ T8731] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2342.258389][ T8731] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2342.266346][ T8731] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 18:56:01 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') 18:56:01 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000f703000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:01 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000008000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x4c00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:01 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000b04000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:01 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004004000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2342.298318][ T8731] EXT4-fs (loop4): can't allocate buddy meta group [ 2342.306296][ T8743] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2342.319171][ T8743] EXT4-fs (loop3): get root inode failed [ 2342.326877][ T8731] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 2342.327956][ T8743] EXT4-fs (loop3): mount failed [ 2342.336203][ T8731] EXT4-fs (loop4): mount failed [ 2342.517380][ T8743] EXT4-fs: failed to create workqueue [ 2342.535788][ T8743] EXT4-fs (loop3): mount failed [ 2342.556249][ T8768] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue 18:56:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004104000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040400008000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 4 (fault-call:0 fault-nth:94): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6203000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004204000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) listen(0xffffffffffffffff, 0xfffff363) 18:56:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004304000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004404000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004504000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004604000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004704000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2342.746528][ T8778] FAULT_INJECTION: forcing a failure. [ 2342.746528][ T8778] name failslab, interval 1, probability 0, space 0, times 0 [ 2342.767050][ T8778] CPU: 0 PID: 8778 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2342.777122][ T8778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2342.787166][ T8778] Call Trace: [ 2342.790456][ T8778] dump_stack+0x1b0/0x21e [ 2342.794780][ T8778] ? devkmsg_release+0x11c/0x11c [ 2342.799714][ T8778] ? show_regs_print_info+0x12/0x12 [ 2342.804928][ T8778] ? pcpu_block_update_hint_alloc+0x98f/0xd00 [ 2342.810980][ T8778] should_fail+0x6fb/0x860 [ 2342.815378][ T8778] ? setup_fault_attr+0x2b0/0x2b0 [ 2342.820380][ T8778] ? setup_fault_attr+0x2b0/0x2b0 [ 2342.825382][ T8778] ? ext4_alloc_inode+0x1b/0x620 [ 2342.830292][ T8778] should_failslab+0x5/0x20 [ 2342.834771][ T8778] kmem_cache_alloc+0x36/0x250 [ 2342.839529][ T8778] ? __rcu_read_lock+0x50/0x50 [ 2342.844270][ T8778] ? set_qf_name+0x350/0x350 [ 2342.848856][ T8778] ext4_alloc_inode+0x1b/0x620 [ 2342.853594][ T8778] ? set_qf_name+0x350/0x350 [ 2342.858158][ T8778] new_inode_pseudo+0x64/0x240 [ 2342.862899][ T8778] new_inode+0x25/0x1d0 [ 2342.867031][ T8778] ? ext4_mb_alloc_groupinfo+0x208/0x2e0 [ 2342.872639][ T8778] ext4_mb_init+0xb8e/0x1360 [ 2342.877211][ T8778] ext4_fill_super+0xbc36/0xe890 [ 2342.882136][ T8778] ? ext4_mount+0x40/0x40 [ 2342.886444][ T8778] ? idr_replace+0x1aa/0x220 [ 2342.891028][ T8778] ? snprintf+0xc0/0x110 [ 2342.895246][ T8778] ? up_read+0x10/0x10 [ 2342.899311][ T8778] ? vscnprintf+0x80/0x80 [ 2342.903622][ T8778] mount_bdev+0x22d/0x340 [ 2342.907926][ T8778] ? ext4_mount+0x40/0x40 [ 2342.912240][ T8778] legacy_get_tree+0xde/0x170 [ 2342.916895][ T8778] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2342.922244][ T8778] vfs_get_tree+0x85/0x260 [ 2342.926656][ T8778] do_mount+0x1883/0x2630 [ 2342.930981][ T8778] ? setup_fault_attr+0x2b0/0x2b0 [ 2342.935985][ T8778] ? up_write+0xa1/0x190 [ 2342.940208][ T8778] ? setup_fault_attr+0x2b0/0x2b0 [ 2342.945211][ T8778] ? copy_mount_string+0x30/0x30 [ 2342.950127][ T8778] ? retain_dentry+0x275/0x360 [ 2342.954868][ T8778] ? copy_mount_options+0x59/0x320 [ 2342.959974][ T8778] ? copy_mount_options+0x293/0x320 [ 2342.965150][ T8778] ksys_mount+0xc2/0xf0 [ 2342.969286][ T8778] __x64_sys_mount+0xb1/0xc0 [ 2342.973868][ T8778] do_syscall_64+0xcb/0x150 [ 2342.978355][ T8778] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2342.984223][ T8778] RIP: 0033:0x4608aa [ 2342.988111][ T8778] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2343.007694][ T8778] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2343.016082][ T8778] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2343.024034][ T8778] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2343.031979][ T8778] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2343.040014][ T8778] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2343.047981][ T8778] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2343.059611][ T8778] EXT4-fs (loop4): can't get new inode [ 2343.065830][ T8778] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 2343.073282][ T8778] EXT4-fs (loop4): mount failed [ 2343.081381][ T8796] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2343.093702][ T8796] EXT4-fs (loop3): get root inode failed [ 2343.094673][ T8801] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2343.099602][ T8796] EXT4-fs (loop3): mount failed [ 2343.207746][ T8796] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2343.219448][ T8796] EXT4-fs (loop3): get root inode failed [ 2343.225700][ T8796] EXT4-fs (loop3): mount failed 18:56:02 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2010, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004804000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6303000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:02 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000040000000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 4 (fault-call:0 fault-nth:95): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:02 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, &(0x7f0000000140)) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000100)={0x3, 'macvtap0\x00', {0xd302}, 0x2}) 18:56:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6603000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:02 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000000010000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:02 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004904000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2343.387084][ T8817] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2343.392485][ T8816] FAULT_INJECTION: forcing a failure. [ 2343.392485][ T8816] name failslab, interval 1, probability 0, space 0, times 0 [ 2343.431567][ T8828] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2343.439423][ T8816] CPU: 1 PID: 8816 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2343.453102][ T8816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2343.455674][ T8828] EXT4-fs (loop3): get root inode failed [ 2343.463143][ T8816] Call Trace: [ 2343.463161][ T8816] dump_stack+0x1b0/0x21e [ 2343.463170][ T8816] ? devkmsg_release+0x11c/0x11c 18:56:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) syz_usb_control_io$printer(0xffffffffffffffff, &(0x7f00000002c0)={0x14, &(0x7f0000000100)={0x40, 0xa, 0xbf, {0xbf, 0x22, "95ad12141da49dad97074f4542d0f515d85e4b5308488f16a2792796b61bd16f4f4d726e8fb83de2b1bdd3b524e7b43f98268e059022a3e67d3613f4c4ec721459c2450382910e87907af75790a571de53edc99700e22fcc13cfb81eee37e305adaa05e417cbec744578549d7c77e06eaf1e2ceafe2d3ff3d6968b6b2a7abe565e3822415dbd0dd76acbbad853654341d9653158bd35fac905ba42b347dc2d8d1704bf7a6b946e203a32b8c7c0a54c511b7039c16c9615924b24cd9a5e"}}, &(0x7f0000000080)={0x0, 0x3, 0x1f, @string={0x1f, 0x3, "5bd891791e33a8f3cda531cadfee7c03463189dfea0a7d09cff62f37c5"}}}, &(0x7f00000005c0)={0x34, &(0x7f0000000300)={0x0, 0xe, 0x9a, "06bde666a29aee74f33bf815a7ed8b0ee5d6b190167843735f5d4416358c4cca34eb82eae06ed7d6b3131369ee3dd542770dbae145b20ba0ffb402055cac99e8b6bf44760e785ed9a8522b4b2e962e77be93ce904118289a5fa023d5ad46a358839ff0d2ae81c0f4d110f1d66c4fb8734a732887eaf5de2d9edaca3c5b6d368bdc87229ce8714874309f610f8666d65112481cccf1c8e56a4651"}, &(0x7f00000003c0)={0x0, 0xa, 0x1, 0x9}, &(0x7f0000000400)={0x0, 0x8, 0x1}, &(0x7f0000000440)={0x20, 0x0, 0xe0, {0xde, "d4c1eac64a5794e48e2aea3a3059a091901061c359eb8fd82c1bbe96d2494f2db63ad5bef716cb72f4a724c9ba5b5f9271094b86fe0724c25675291ee730d4d14986de750922899921241d8e14b4be05862ce69048cae655d6597d5311b81822b2b0730ee66876d6f746185547df3153647cc5697d8e9e53fa1ffbbd14e5495a1172cb6d784824123a440053e16e1a73d3a0e4bd2862ed5caa6591b5b99f36115402726a00319efd516634013b994349d8193d94e7baa6cc7543237c6fc5a58301245bc09effbad8f6857fc195dd996fbd88ddbb95fa433f8800e63649e7"}}, &(0x7f0000000540)={0x20, 0x1, 0x1, 0x4}, &(0x7f0000000580)={0x20, 0x0, 0x1, 0x3}}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x462c81, 0x221) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1, &(0x7f00000002c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000680)={&(0x7f0000000640)='./file0\x00', r0}, 0x10) [ 2343.463179][ T8816] ? __x64_sys_mount+0xb1/0xc0 [ 2343.463187][ T8816] ? show_regs_print_info+0x12/0x12 [ 2343.463196][ T8816] ? pcpu_block_refresh_hint+0x22d/0x350 [ 2343.463206][ T8816] should_fail+0x6fb/0x860 [ 2343.463214][ T8816] ? setup_fault_attr+0x2b0/0x2b0 [ 2343.463222][ T8816] ? should_fail+0x182/0x860 [ 2343.463236][ T8816] ? should_fail+0x182/0x860 [ 2343.474927][ T8828] EXT4-fs (loop3): mount failed [ 2343.476419][ T8816] ? setup_fault_attr+0x2b0/0x2b0 [ 2343.476430][ T8816] ? security_inode_alloc+0x32/0x1f0 [ 2343.476437][ T8816] should_failslab+0x5/0x20 [ 2343.476450][ T8816] kmem_cache_alloc+0x36/0x250 [ 2343.539760][ T8816] security_inode_alloc+0x32/0x1f0 [ 2343.544851][ T8816] inode_init_always+0x37c/0x800 [ 2343.549757][ T8816] ? set_qf_name+0x350/0x350 [ 2343.554315][ T8816] new_inode_pseudo+0x7b/0x240 [ 2343.559047][ T8816] new_inode+0x25/0x1d0 [ 2343.563173][ T8816] ? ext4_mb_alloc_groupinfo+0x208/0x2e0 [ 2343.568798][ T8816] ext4_mb_init+0xb8e/0x1360 [ 2343.573359][ T8816] ext4_fill_super+0xbc36/0xe890 [ 2343.578266][ T8816] ? ext4_mount+0x40/0x40 [ 2343.582564][ T8816] ? idr_replace+0x1aa/0x220 [ 2343.587126][ T8816] ? snprintf+0xc0/0x110 [ 2343.591873][ T8816] ? up_read+0x10/0x10 [ 2343.595912][ T8816] ? vscnprintf+0x80/0x80 [ 2343.600210][ T8816] mount_bdev+0x22d/0x340 [ 2343.604547][ T8816] ? ext4_mount+0x40/0x40 [ 2343.608844][ T8816] legacy_get_tree+0xde/0x170 [ 2343.613506][ T8816] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2343.618863][ T8816] vfs_get_tree+0x85/0x260 [ 2343.623247][ T8816] do_mount+0x1883/0x2630 [ 2343.627544][ T8816] ? setup_fault_attr+0x2b0/0x2b0 [ 2343.632548][ T8816] ? up_write+0xa1/0x190 [ 2343.636774][ T8816] ? setup_fault_attr+0x2b0/0x2b0 [ 2343.641765][ T8816] ? copy_mount_string+0x30/0x30 [ 2343.646668][ T8816] ? retain_dentry+0x275/0x360 [ 2343.651421][ T8816] ? copy_mount_options+0x59/0x320 [ 2343.656500][ T8816] ? copy_mount_options+0x293/0x320 [ 2343.661712][ T8816] ksys_mount+0xc2/0xf0 [ 2343.665836][ T8816] __x64_sys_mount+0xb1/0xc0 [ 2343.670479][ T8816] do_syscall_64+0xcb/0x150 [ 2343.674951][ T8816] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2343.680809][ T8816] RIP: 0033:0x4608aa [ 2343.684670][ T8816] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2343.704242][ T8816] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2343.712618][ T8816] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2343.720556][ T8816] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 18:56:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004a04000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004b04000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2343.728494][ T8816] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2343.736451][ T8816] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2343.744393][ T8816] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2343.753410][ T8816] EXT4-fs (loop4): can't get new inode [ 2343.758971][ T8816] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 2343.766165][ T8816] EXT4-fs (loop4): mount failed 18:56:03 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2102, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200004c04000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000005000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000006000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:03 executing program 4 (fault-call:0 fault-nth:96): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000007000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:03 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000000020000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6703000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:03 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000009000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2343.979266][ T8862] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2343.996545][ T8867] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2344.003228][ T8862] EXT4-fs (loop3): get root inode failed [ 2344.018188][ T8862] EXT4-fs (loop3): mount failed [ 2344.069829][ T8871] FAULT_INJECTION: forcing a failure. [ 2344.069829][ T8871] name failslab, interval 1, probability 0, space 0, times 0 [ 2344.082570][ T8871] CPU: 0 PID: 8871 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2344.092614][ T8871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2344.102653][ T8871] Call Trace: [ 2344.105919][ T8871] dump_stack+0x1b0/0x21e [ 2344.110223][ T8871] ? devkmsg_release+0x11c/0x11c [ 2344.115129][ T8871] ? __x64_sys_mount+0xb1/0xc0 [ 2344.119864][ T8871] ? show_regs_print_info+0x12/0x12 [ 2344.125033][ T8871] ? pcpu_block_refresh_hint+0x22d/0x350 [ 2344.130635][ T8871] should_fail+0x6fb/0x860 [ 2344.135037][ T8871] ? setup_fault_attr+0x2b0/0x2b0 [ 2344.140030][ T8871] ? should_fail+0x182/0x860 [ 2344.144594][ T8871] ? security_inode_alloc+0x32/0x1f0 [ 2344.149845][ T8871] should_failslab+0x5/0x20 [ 2344.154326][ T8871] kmem_cache_alloc+0x36/0x250 [ 2344.159059][ T8871] security_inode_alloc+0x32/0x1f0 [ 2344.164138][ T8871] inode_init_always+0x37c/0x800 [ 2344.169043][ T8871] ? set_qf_name+0x350/0x350 [ 2344.173603][ T8871] new_inode_pseudo+0x7b/0x240 [ 2344.178339][ T8871] new_inode+0x25/0x1d0 [ 2344.182463][ T8871] ? ext4_mb_alloc_groupinfo+0x208/0x2e0 [ 2344.188063][ T8871] ext4_mb_init+0xb8e/0x1360 [ 2344.192627][ T8871] ext4_fill_super+0xbc36/0xe890 [ 2344.197551][ T8871] ? ext4_mount+0x40/0x40 [ 2344.201885][ T8871] ? idr_replace+0x1aa/0x220 [ 2344.206457][ T8871] ? snprintf+0xc0/0x110 [ 2344.210688][ T8871] ? up_read+0x10/0x10 [ 2344.214728][ T8871] ? vscnprintf+0x80/0x80 [ 2344.219028][ T8871] mount_bdev+0x22d/0x340 [ 2344.223327][ T8871] ? ext4_mount+0x40/0x40 [ 2344.227636][ T8871] legacy_get_tree+0xde/0x170 [ 2344.232285][ T8871] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2344.237635][ T8871] vfs_get_tree+0x85/0x260 [ 2344.242027][ T8871] do_mount+0x1883/0x2630 [ 2344.246330][ T8871] ? setup_fault_attr+0x2b0/0x2b0 [ 2344.251338][ T8871] ? up_write+0xa1/0x190 [ 2344.255555][ T8871] ? setup_fault_attr+0x2b0/0x2b0 [ 2344.260551][ T8871] ? copy_mount_string+0x30/0x30 [ 2344.265496][ T8871] ? retain_dentry+0x275/0x360 [ 2344.270262][ T8871] ? copy_mount_options+0x59/0x320 [ 2344.275352][ T8871] ? copy_mount_options+0x293/0x320 [ 2344.280522][ T8871] ksys_mount+0xc2/0xf0 [ 2344.284651][ T8871] __x64_sys_mount+0xb1/0xc0 [ 2344.289231][ T8871] do_syscall_64+0xcb/0x150 [ 2344.293706][ T8871] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2344.299568][ T8871] RIP: 0033:0x4608aa [ 2344.303442][ T8871] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2344.323013][ T8871] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2344.331408][ T8871] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2344.339351][ T8871] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2344.347294][ T8871] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2344.355252][ T8871] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2344.363205][ T8871] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2344.373297][ T8871] EXT4-fs (loop4): can't get new inode [ 2344.378908][ T8871] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 2344.385812][ T8871] EXT4-fs (loop4): mount failed [ 2344.461324][ T8862] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2344.473158][ T8862] EXT4-fs (loop3): get root inode failed [ 2344.478814][ T8862] EXT4-fs (loop3): mount failed 18:56:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0/file0\x00', 0x1, 0x115) 18:56:04 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000a000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:04 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000004020000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:04 executing program 4 (fault-call:0 fault-nth:97): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6800000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:04 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2200, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:04 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000b000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:04 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000040b000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:04 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000c000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:04 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000d000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:04 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000000e000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:04 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200002010000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2344.922633][ T8896] FAULT_INJECTION: forcing a failure. [ 2344.922633][ T8896] name failslab, interval 1, probability 0, space 0, times 0 [ 2344.938116][ T8896] CPU: 0 PID: 8896 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2344.948187][ T8896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2344.958230][ T8896] Call Trace: [ 2344.961506][ T8896] dump_stack+0x1b0/0x21e [ 2344.963153][ T8928] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2344.965817][ T8896] ? devkmsg_release+0x11c/0x11c [ 2344.965829][ T8896] ? show_regs_print_info+0x12/0x12 [ 2344.965846][ T8896] ? should_fail+0x182/0x860 [ 2344.989340][ T8896] ? setup_fault_attr+0x2b0/0x2b0 [ 2344.994362][ T8896] should_fail+0x6fb/0x860 [ 2344.996978][ T8928] EXT4-fs warning (device loop5): ext4_dirblock_csum_verify:372: inode #2: comm syz-executor.5: No space for directory leaf checksum. Please run e2fsck -D. [ 2344.998772][ T8896] ? setup_fault_attr+0x2b0/0x2b0 [ 2344.998783][ T8896] ? security_inode_alloc+0x32/0x1f0 [ 2344.998794][ T8896] ? __rcu_read_lock+0x50/0x50 [ 2344.998803][ T8896] ? ext4_mb_add_groupinfo+0x263/0x780 [ 2344.998811][ T8896] should_failslab+0x5/0x20 [ 2344.998826][ T8896] kmem_cache_alloc+0x36/0x250 [ 2345.023253][ T8928] EXT4-fs error (device loop5): __ext4_find_entry:1621: inode #2: comm syz-executor.5: checksumming directory block 0 [ 2345.024722][ T8896] ext4_mb_add_groupinfo+0x263/0x780 [ 2345.024737][ T8896] ext4_mb_init+0xc65/0x1360 18:56:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000080)=0x9) 18:56:04 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000000030000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6a03000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2345.040488][ T8900] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2345.044146][ T8896] ext4_fill_super+0xbc36/0xe890 [ 2345.044160][ T8896] ? ext4_mount+0x40/0x40 [ 2345.044175][ T8896] ? idr_replace+0x1aa/0x220 [ 2345.062831][ T8900] EXT4-fs (loop3): get root inode failed [ 2345.066301][ T8896] ? snprintf+0xc0/0x110 [ 2345.066310][ T8896] ? up_read+0x10/0x10 [ 2345.066318][ T8896] ? vscnprintf+0x80/0x80 [ 2345.066329][ T8896] mount_bdev+0x22d/0x340 [ 2345.066337][ T8896] ? ext4_mount+0x40/0x40 [ 2345.066346][ T8896] legacy_get_tree+0xde/0x170 [ 2345.066353][ T8896] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2345.066360][ T8896] vfs_get_tree+0x85/0x260 [ 2345.066369][ T8896] do_mount+0x1883/0x2630 [ 2345.066377][ T8896] ? _raw_spin_unlock+0x5/0x20 [ 2345.066391][ T8896] ? ___slab_alloc+0x297/0x450 [ 2345.087561][ T8935] EXT4-fs warning (device loop5): ext4_dirblock_csum_verify:372: inode #2: comm syz-executor.5: No space for directory leaf checksum. Please run e2fsck -D. [ 2345.091757][ T8896] ? copy_mount_string+0x30/0x30 [ 2345.091766][ T8896] ? copy_mount_options+0x59/0x320 [ 2345.091778][ T8896] ? copy_mount_options+0x293/0x320 [ 2345.097454][ T8935] EXT4-fs error (device loop5): __ext4_find_entry:1621: inode #2: comm syz-executor.5: checksumming directory block 0 [ 2345.101609][ T8896] ksys_mount+0xc2/0xf0 [ 2345.101621][ T8896] __x64_sys_mount+0xb1/0xc0 [ 2345.101630][ T8896] do_syscall_64+0xcb/0x150 [ 2345.101645][ T8896] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2345.111822][ T8900] EXT4-fs (loop3): mount failed [ 2345.114302][ T8896] RIP: 0033:0x4608aa [ 2345.114311][ T8896] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2345.114316][ T8896] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2345.114324][ T8896] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2345.114329][ T8896] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2345.114333][ T8896] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2345.114343][ T8896] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2345.277445][ T8896] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2345.286718][ T8896] EXT4-fs (loop4): can't allocate buddy mem [ 2345.292856][ T8896] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 2345.299667][ T8896] EXT4-fs (loop4): mount failed 18:56:05 executing program 4 (fault-call:0 fault-nth:98): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:05 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000000040000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2300, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000011000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x6c00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000012000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000018000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2345.447141][ T8900] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2345.460502][ T8900] EXT4-fs (loop3): get root inode failed [ 2345.475441][ T8900] EXT4-fs (loop3): mount failed 18:56:05 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000000050000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x7400000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 2345.556006][ T8950] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue [ 2345.565761][ T8962] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2345.578254][ T8953] FAULT_INJECTION: forcing a failure. [ 2345.578254][ T8953] name failslab, interval 1, probability 0, space 0, times 0 [ 2345.598312][ T8953] CPU: 1 PID: 8953 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2345.608381][ T8953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2345.618439][ T8953] Call Trace: [ 2345.621734][ T8953] dump_stack+0x1b0/0x21e [ 2345.626063][ T8953] ? devkmsg_release+0x11c/0x11c [ 2345.630998][ T8953] ? show_regs_print_info+0x12/0x12 [ 2345.636185][ T8953] ? __kasan_kmalloc+0x117/0x1b0 [ 2345.641114][ T8953] ? __kmalloc+0xf7/0x2c0 [ 2345.645446][ T8953] ? ext4_alloc_flex_bg_array+0x174/0x470 [ 2345.651157][ T8953] ? ext4_fill_super+0xc6be/0xe890 [ 2345.656300][ T8953] ? mount_bdev+0x22d/0x340 [ 2345.660774][ T8953] ? legacy_get_tree+0xde/0x170 [ 2345.665597][ T8953] should_fail+0x6fb/0x860 [ 2345.669984][ T8953] ? setup_fault_attr+0x2b0/0x2b0 [ 2345.674980][ T8953] ? kobject_set_name_vargs+0x5d/0x110 [ 2345.680433][ T8953] should_failslab+0x5/0x20 [ 2345.684908][ T8953] __kmalloc_track_caller+0x5d/0x2b0 [ 2345.690171][ T8953] kstrdup_const+0x51/0x90 [ 2345.694581][ T8953] kobject_set_name_vargs+0x5d/0x110 [ 2345.699859][ T8953] kobject_init_and_add+0xc8/0x160 18:56:05 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x6}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0xfff}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xffffffff, 0x438600) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f00000103c0)={0x2020, 0x0, 0x0}, 0x2020) ioctl$MON_IOCQ_RING_SIZE(r1, 0x9205) write$FUSE_INIT(r2, &(0x7f00000001c0)={0x50, 0x0, r3}, 0x50) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f00000002c0)={'broute\x00'}, &(0x7f0000000340)=0x78) write$P9_RSETATTR(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x1b, 0x1}, 0x7) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000380), &(0x7f00000003c0)=0xc) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18, 0x0, r3, {0x80}}, 0x18) ioctl$F2FS_IOC_RESIZE_FS(r0, 0x4008f510, &(0x7f0000000180)=0x3) ioctl$TIOCGPTPEER(r1, 0x5441, 0x8) close(r2) 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000001f000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2345.704968][ T8953] ? kvmalloc_node+0xc2/0x120 [ 2345.709631][ T8953] ? kobject_add+0x200/0x200 [ 2345.711084][ T8962] EXT4-fs (loop3): get root inode failed [ 2345.714202][ T8953] ? mutex_lock+0xa6/0x110 [ 2345.714215][ T8953] ext4_register_sysfs+0xa8/0x210 [ 2345.714227][ T8953] ext4_fill_super+0xc602/0xe890 [ 2345.714242][ T8953] ? ext4_mount+0x40/0x40 [ 2345.719936][ T8962] EXT4-fs (loop3): mount failed [ 2345.724245][ T8953] ? idr_replace+0x1aa/0x220 [ 2345.724256][ T8953] ? snprintf+0xc0/0x110 [ 2345.724265][ T8953] ? up_read+0x10/0x10 [ 2345.724273][ T8953] ? vscnprintf+0x80/0x80 [ 2345.724286][ T8953] mount_bdev+0x22d/0x340 [ 2345.764737][ T8953] ? ext4_mount+0x40/0x40 [ 2345.769038][ T8953] legacy_get_tree+0xde/0x170 [ 2345.773684][ T8953] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2345.779025][ T8953] vfs_get_tree+0x85/0x260 [ 2345.783411][ T8953] do_mount+0x1883/0x2630 [ 2345.787720][ T8953] ? setup_fault_attr+0x2b0/0x2b0 [ 2345.792713][ T8953] ? up_write+0xa1/0x190 [ 2345.796930][ T8953] ? ___slab_alloc+0x9b/0x450 [ 2345.801587][ T8953] ? copy_mount_string+0x30/0x30 [ 2345.806493][ T8953] ? retain_dentry+0x275/0x360 [ 2345.811232][ T8953] ? copy_mount_options+0x59/0x320 [ 2345.816315][ T8953] ? copy_mount_options+0x293/0x320 [ 2345.821485][ T8953] ksys_mount+0xc2/0xf0 [ 2345.825612][ T8953] __x64_sys_mount+0xb1/0xc0 [ 2345.830173][ T8953] do_syscall_64+0xcb/0x150 [ 2345.834663][ T8953] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2345.840530][ T8953] RIP: 0033:0x4608aa [ 2345.844398][ T8953] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2345.863996][ T8953] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2345.872391][ T8953] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2345.880349][ T8953] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2345.888290][ T8953] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2345.896254][ T8953] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000020000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2345.904194][ T8953] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2345.913725][ T8953] kobject: can not set name properly! [ 2345.920045][ T8953] EXT4-fs (loop4): mount failed 18:56:05 executing program 4 (fault-call:0 fault-nth:99): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200001020000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:05 executing program 3: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x2500, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004", 0x1b, 0x22100}], 0x0, &(0x7f0000000300)=ANY=[]) 18:56:05 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000000060000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000022000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200000025000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200002725000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000001180)='tmpfs\x00', &(0x7f00000011c0)='./file0\x00', 0x7a00000000000000, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000000040)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 18:56:05 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e0200002527000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) [ 2346.158438][ T9003] EXT4-fs error (device loop3): ext4_fill_super:4591: inode #2: comm syz-executor.3: iget: checksum invalid [ 2346.170569][ T9003] EXT4-fs (loop3): get root inode failed [ 2346.179075][ T9003] EXT4-fs (loop3): mount failed [ 2346.189355][ T9005] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 2346.207506][ T9009] FAULT_INJECTION: forcing a failure. [ 2346.207506][ T9009] name failslab, interval 1, probability 0, space 0, times 0 [ 2346.221101][ T9009] CPU: 0 PID: 9009 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2346.231157][ T9009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2346.241182][ T9009] Call Trace: [ 2346.244457][ T9009] dump_stack+0x1b0/0x21e [ 2346.248771][ T9009] ? devkmsg_release+0x11c/0x11c [ 2346.253684][ T9009] ? show_regs_print_info+0x12/0x12 [ 2346.258857][ T9009] should_fail+0x6fb/0x860 [ 2346.263246][ T9009] ? setup_fault_attr+0x2b0/0x2b0 [ 2346.268243][ T9009] ? kvmalloc_node+0xc2/0x120 [ 2346.272887][ T9009] should_failslab+0x5/0x20 [ 2346.277359][ T9009] __kmalloc+0x5f/0x2c0 [ 2346.281483][ T9009] ? kvmalloc_node+0xc2/0x120 [ 2346.286152][ T9009] kvmalloc_node+0xc2/0x120 [ 2346.290638][ T9009] ext4_alloc_flex_bg_array+0x174/0x470 [ 2346.296168][ T9009] ext4_fill_super+0xc6be/0xe890 [ 2346.301081][ T9009] ? ext4_mount+0x40/0x40 [ 2346.305382][ T9009] ? idr_replace+0x1aa/0x220 [ 2346.309947][ T9009] ? snprintf+0xc0/0x110 [ 2346.314164][ T9009] ? up_read+0x10/0x10 [ 2346.318212][ T9009] ? vscnprintf+0x80/0x80 [ 2346.322521][ T9009] mount_bdev+0x22d/0x340 [ 2346.326830][ T9009] ? ext4_mount+0x40/0x40 [ 2346.331139][ T9009] legacy_get_tree+0xde/0x170 [ 2346.335782][ T9009] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2346.341123][ T9009] vfs_get_tree+0x85/0x260 [ 2346.345510][ T9009] do_mount+0x1883/0x2630 [ 2346.349810][ T9009] ? setup_fault_attr+0x2b0/0x2b0 [ 2346.354801][ T9009] ? up_write+0xa1/0x190 [ 2346.359026][ T9009] ? ___slab_alloc+0x9b/0x450 [ 2346.363735][ T9009] ? copy_mount_string+0x30/0x30 [ 2346.368646][ T9009] ? retain_dentry+0x275/0x360 [ 2346.373414][ T9009] ? copy_mount_options+0x59/0x320 [ 2346.378498][ T9009] ? copy_mount_options+0x293/0x320 [ 2346.383666][ T9009] ksys_mount+0xc2/0xf0 [ 2346.387793][ T9009] __x64_sys_mount+0xb1/0xc0 [ 2346.392352][ T9009] do_syscall_64+0xcb/0x150 [ 2346.396826][ T9009] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2346.402711][ T9009] RIP: 0033:0x4608aa [ 2346.406584][ T9009] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2346.426158][ T9009] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2346.434552][ T9009] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2346.442505][ T9009] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2346.450462][ T9009] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2346.458429][ T9009] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2346.466374][ T9009] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2346.476064][ T9009] EXT4-fs (loop4): not enough memory for 1 flex groups [ 2346.483205][ T9009] EXT4-fs (loop4): unable to initialize flex_bg meta info! [ 2346.490673][ T9009] EXT4-fs (loop4): mount failed [ 2346.495763][ T9009] kasan: CONFIG_KASAN_INLINE enabled [ 2346.501414][ T9009] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2346.517417][ T9009] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2346.524355][ T9009] CPU: 0 PID: 9009 Comm: syz-executor.4 Not tainted 5.4.70-syzkaller-00064-gcfc2b5293ada #0 [ 2346.534400][ T9009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2346.544449][ T9009] RIP: 0010:legacy_get_tree+0xfe/0x170 [ 2346.549878][ T9009] Code: 89 ff 89 ee 48 89 da ff 14 24 48 89 c5 48 3d 01 f0 ff ff 72 07 e8 e2 7c c0 ff eb 48 48 89 eb 48 83 c3 68 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 e3 36 ee ff 48 83 3b 00 74 50 e8 [ 2346.569462][ T9009] RSP: 0018:ffff8881ce8cfcc8 EFLAGS: 00010202 [ 2346.575499][ T9009] RAX: 000000000000000d RBX: 0000000000000068 RCX: 0000000000040000 [ 2346.583437][ T9009] RDX: ffffc90005463000 RSI: 000000000003abdb RDI: 000000000003abdc [ 2346.591378][ T9009] RBP: 0000000000000000 R08: ffffffff81742a28 R09: 000000000000000c [ 2346.599337][ T9009] R10: ffffed103b706515 R11: 0000000000000000 R12: ffff8881d8adbe00 [ 2346.607297][ T9009] R13: dffffc0000000000 R14: ffff8881c89b1140 R15: ffffffff84c78e78 [ 2346.615269][ T9009] FS: 00007f415c78c700(0000) GS:ffff8881db800000(0000) knlGS:0000000000000000 [ 2346.624167][ T9009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2346.630717][ T9009] CR2: 000000000043f630 CR3: 000000019d612005 CR4: 00000000001606f0 [ 2346.638659][ T9009] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2346.646600][ T9009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 2346.654539][ T9009] Call Trace: [ 2346.657851][ T9009] ? ext4_lazyinit_thread+0xd20/0xd20 [ 2346.663205][ T9009] vfs_get_tree+0x85/0x260 [ 2346.667632][ T9009] do_mount+0x1883/0x2630 [ 2346.671945][ T9009] ? setup_fault_attr+0x2b0/0x2b0 [ 2346.676939][ T9009] ? up_write+0xa1/0x190 [ 2346.681150][ T9009] ? ___slab_alloc+0x9b/0x450 [ 2346.685793][ T9009] ? copy_mount_string+0x30/0x30 [ 2346.690714][ T9009] ? retain_dentry+0x275/0x360 [ 2346.695471][ T9009] ? copy_mount_options+0x59/0x320 [ 2346.700552][ T9009] ? copy_mount_options+0x293/0x320 [ 2346.705736][ T9009] ksys_mount+0xc2/0xf0 [ 2346.709861][ T9009] __x64_sys_mount+0xb1/0xc0 [ 2346.714439][ T9009] do_syscall_64+0xcb/0x150 [ 2346.718997][ T9009] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2346.724855][ T9009] RIP: 0033:0x4608aa [ 2346.728716][ T9009] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 89 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8a 89 fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2346.748286][ T9009] RSP: 002b:00007f415c78ba88 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 2346.756662][ T9009] RAX: ffffffffffffffda RBX: 00007f415c78bb20 RCX: 00000000004608aa [ 2346.764602][ T9009] RDX: 0000000020000000 RSI: 00000000200000c0 RDI: 00007f415c78bae0 [ 2346.772558][ T9009] RBP: 00007f415c78bae0 R08: 00007f415c78bb20 R09: 0000000020000000 [ 2346.780501][ T9009] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 2346.788441][ T9009] R13: 00000000200000c0 R14: 0000000020000200 R15: 0000000020000300 [ 2346.796383][ T9009] Modules linked in: [ 2346.800989][ T9009] ---[ end trace 93a939487c3407f3 ]--- [ 2346.806853][ T9009] RIP: 0010:legacy_get_tree+0xfe/0x170 [ 2346.812517][ T9009] Code: 89 ff 89 ee 48 89 da ff 14 24 48 89 c5 48 3d 01 f0 ff ff 72 07 e8 e2 7c c0 ff eb 48 48 89 eb 48 83 c3 68 48 89 d8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 df e8 e3 36 ee ff 48 83 3b 00 74 50 e8 [ 2346.835267][ T9009] RSP: 0018:ffff8881ce8cfcc8 EFLAGS: 00010202 [ 2346.841490][ T9009] RAX: 000000000000000d RBX: 0000000000000068 RCX: 0000000000040000 [ 2346.849664][ T9005] EXT4-fs (loop5): VFS: Found ext4 filesystem with invalid superblock checksum. Run e2fsck? [ 2346.850912][ T9009] RDX: ffffc90005463000 RSI: 000000000003abdb RDI: 000000000003abdc 18:56:06 executing program 0: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000002000000001000000000000000040000004060000180000001f", 0x31, 0x400}, {0x0}], 0x0, &(0x7f0000014b00)) 18:56:06 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="1020f5f201000b0009000000030000000c000000090000000100000001000000000000000040000000000000180000001f0000000200000002000000020000000100000018000000000200000002000000060000000a0000000e020000003f000300000001", 0x65, 0x400}, {0x0, 0x0, 0xc80}], 0x0, &(0x7f0000014b00)) 18:56:06 executing program 5: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @initdev, @multicast1}, &(0x7f0000000100)=0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, &(0x7f0000000140)=[{&(0x7f0000010000)="2000000040000000030000002d0000000f0000000000000002000000020000000080000000800000200000002bc4645f2bc4645f0100ffff53ef0100010000002bc4645f000000000000000001000000000000000b0000000001000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e373836333438323637", 0xa2, 0x400}, {&(0x7f0000010100)="0000000000000000000000002f527b43270a4164871303f1137e5908010040000c000000000000002bc4645f", 0x2c, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000500000000000000000000000000000000000000040100004d", 0x39, 0x540}, {&(0x7f0000000040)="00000000000000000000000000000000000000000000000000000000787371fe", 0x20, 0x7e0}, {&(0x7f0000010400)="0200000012000000220000002d000f00030004000000000031245cf20f0062e6000000000000000000000000000000000000000000000000d4189ee9", 0x3c, 0x1000}, {&(0x7f0000011d00)="ffff01", 0x3, 0x12000}, {&(0x7f0000012f00)="ed410000001000002bc4645f2bc4645f2bc4645f00000000000004000800000000000800050000000af3010004000000000000000000000001000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f49000020004f3f54a9d2a254a9d2a2000000002bc4645f", 0x94, 0x22100}, {&(0x7f00000002c0)="e541f41c094aa0331162156bb69c059d122475e41e374f84e41ca5e152776d2e0893e2d939cd0032d197e7cdf8ad00a35bbb423dbbe4e432984bdf1c1447e32d30c6e10c37f9564268abd5d5ade07e4863fdc88f9fb93a18f7d44a35f89c77314270d5b452c4ab0c3eb60dbbff064d80fce2b0a09ff271ab67942697aee4c3850be32950a6739a570e5595591ea176cb2253af017ae40cb3134915167cd513ffd7dead1d19b2b80a097de9f5bfdf7e618d2914dd41dbade6aaa2f0e8ed1a4d8a8561", 0xc2, 0xffffffffffff0000}], 0x0, &(0x7f0000000300)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) [ 2346.879400][ T9009] RBP: 0000000000000000 R08: ffffffff81742a28 R09: 000000000000000c [ 2346.897026][ T9009] R10: ffffed103b706515 R11: 0000000000000000 R12: ffff8881d8adbe00 [ 2346.908411][ T9009] R13: dffffc0000000000 R14: ffff8881c89b1140 R15: ffffffff84c78e78 [ 2346.918022][ T9009] FS: 00007f415c78c700(0000) GS:ffff8881db900000(0000) knlGS:0000000000000000 [ 2346.928624][ T9009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2346.936008][ T9009] CR2: 00000000026e79b8 CR3: 000000019d612003 CR4: 00000000001606e0 [ 2346.944470][ T9009] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2346.952662][ T9009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 2346.972237][ T9009] Kernel panic - not syncing: Fatal exception [ 2346.978612][ T9009] Kernel Offset: disabled [ 2346.982933][ T9009] Rebooting in 86400 seconds..